MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 16a422f72038d58a972f54201b0c2d05b4ddf7a21831006e55e320c74db26aee. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 16a422f72038d58a972f54201b0c2d05b4ddf7a21831006e55e320c74db26aee
SHA3-384 hash: 61efc65a4b6550ccb89c89f4bf29225f96ec14dd313197ebe6f0c756094cf80d96c7ee49645694c5b72e2ec14b9a0985
SHA1 hash: bd4568b64c5abff1936a844644f0c21446b20caa
MD5 hash: 206f9da62930605b2cb72dcf86c9d3fa
humanhash: cardinal-whiskey-lithium-colorado
File name:3772809.dat
Download: download sample
Signature Quakbot
File size:1'502'720 bytes
First seen:2022-03-09 17:15:48 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash cf78a88c4b0403a976a85038ec51a351 (22 x Quakbot)
ssdeep 24576:LP2GXxd5hyXOZk/R8SoMbEYN54UUrW/tRJfJ3OIU2SAHl4XoWSIgX4T:Lu8jI6kcYN9R3iKKgX4T
Threatray 154 similar samples on MalwareBazaar
TLSH T1B8657E23F2C1887AD4761A3C9D1B739998BA79112D28F4C77AD44E8C1F37A433666393
File icon (PE):PE icon
dhash icon 399998ecd4d46c0e (572 x Quakbot, 137 x ArkeiStealer, 82 x GCleaner)
Reporter pr0xylife
Tags:dll obama164 Qakbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
201
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe greyware keylogger packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CryptOne Qbot
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Allocates memory in foreign processes
Contains functionality to detect sleep reduction / modifications
Found malware configuration
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sigma detected: Suspicious Call by Ordinal
Writes to foreign memory regions
Yara detected CryptOne packer
Yara detected Qbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 585968 Sample: 3772809.dat Startdate: 09/03/2022 Architecture: WINDOWS Score: 96 22 Found malware configuration 2->22 24 Yara detected CryptOne packer 2->24 26 Yara detected Qbot 2->26 28 2 other signatures 2->28 8 loaddll32.exe 1 2->8         started        process3 signatures4 30 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 8->30 32 Injects code into the Windows Explorer (explorer.exe) 8->32 34 Writes to foreign memory regions 8->34 36 3 other signatures 8->36 11 cmd.exe 1 8->11         started        13 explorer.exe 8 1 8->13         started        process5 process6 15 rundll32.exe 11->15         started        signatures7 38 Maps a DLL or memory area into another process 15->38 40 Contains functionality to detect sleep reduction / modifications 15->40 18 WerFault.exe 23 9 15->18         started        20 explorer.exe 15->20         started        process8
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2022-03-09 17:16:12 UTC
File Type:
PE (Dll)
Extracted files:
40
AV detection:
24 of 27 (88.89%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:obama164 campaign:1646814938 banker stealer trojan
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Qakbot/Qbot
Malware Config
C2 Extraction:
24.178.196.158:2222
1.161.97.158:995
189.253.32.61:995
181.118.183.94:443
197.89.21.109:443
2.50.27.78:443
41.230.62.211:993
89.86.33.217:443
120.61.3.108:443
103.139.242.30:993
24.43.99.75:443
217.165.79.31:443
47.23.89.61:995
175.145.235.37:443
183.88.63.73:2222
47.23.89.61:993
86.98.11.110:443
86.97.209.134:1194
197.37.66.133:995
173.174.216.62:443
217.165.79.31:995
70.57.207.83:443
69.159.200.138:2222
208.107.221.224:443
217.165.85.106:993
39.44.188.102:995
136.143.11.232:443
41.84.244.32:995
5.95.58.211:2087
89.101.97.139:443
176.57.126.138:443
75.99.168.194:61201
41.130.133.118:995
81.229.130.188:443
71.13.93.154:2222
139.64.13.51:995
70.46.220.114:443
128.106.122.181:443
114.79.148.170:443
103.139.242.30:990
80.11.74.81:2222
196.203.37.215:80
144.202.2.175:995
31.35.28.29:443
75.159.9.236:443
190.189.33.6:32101
182.191.92.203:995
39.52.62.239:995
93.48.80.198:995
76.70.9.169:2222
183.82.103.213:443
120.150.218.241:995
67.209.195.198:443
217.128.122.65:2222
38.70.253.226:2222
76.25.142.196:443
92.99.229.158:2222
32.221.231.1:443
78.100.194.196:6883
96.246.158.154:995
124.41.193.166:443
89.211.185.240:2222
197.164.168.41:993
186.10.247.110:443
79.167.199.210:995
45.9.20.200:443
197.237.74.185:995
96.21.251.127:2222
92.177.45.46:2078
206.217.0.154:995
63.153.150.20:443
70.163.1.219:443
72.76.94.99:443
2.50.40.80:61200
188.50.4.45:995
172.114.160.81:995
209.210.95.228:32100
119.158.105.8:995
74.15.2.252:2222
78.169.100.120:443
105.186.100.243:995
103.87.95.131:2222
108.4.67.252:443
80.14.188.219:2222
190.73.3.148:2222
84.241.8.23:32103
2.50.166.30:995
207.170.238.231:443
1.161.97.158:443
144.202.2.175:443
144.202.3.39:995
45.63.1.12:995
45.76.167.26:995
45.63.1.12:443
144.202.3.39:443
149.28.238.199:995
149.28.238.199:443
45.76.167.26:443
121.74.187.191:995
91.177.173.10:995
176.67.56.94:443
140.82.49.12:443
47.180.172.159:443
117.248.109.38:21
75.99.168.194:443
140.82.63.183:995
140.82.63.183:443
41.228.22.180:443
173.21.10.71:2222
86.98.48.115:995
102.140.70.153:443
71.74.12.34:443
189.146.51.56:443
173.170.224.168:995
191.99.191.28:443
73.151.236.31:443
216.10.217.114:443
76.169.147.192:32103
47.180.172.159:50010
187.170.7.81:443
47.156.191.217:443
201.170.181.247:443
5.32.41.45:443
172.114.160.81:443
72.252.201.34:990
100.1.108.246:443
72.12.115.90:22
70.51.139.58:2222
72.252.201.34:995
208.101.87.135:443
40.134.247.125:995
68.204.7.158:443
105.187.31.228:995
187.59.18.65:443
63.143.92.99:995
31.215.70.101:443
109.12.111.14:443
24.55.67.176:443
82.152.39.39:443
191.112.19.94:443
41.84.246.125:443
83.110.218.135:32101
118.189.242.45:2083
39.52.217.44:995
89.137.52.44:443
217.164.120.130:2222
203.109.249.50:995
86.195.158.178:2222
66.230.104.103:443
75.188.35.168:443
Unpacked files
SH256 hash:
3687a74e5473aea72faeaf43b17a72ff344f53866ee63a798ee910ff205b82d5
MD5 hash:
b270c6d4c75f5d6fae4721731c16d05a
SHA1 hash:
6d1d7b74b3eb543d2e2856e6436e3fc0478c9f84
SH256 hash:
6c7defdcd8a922ef026d012994d5960b117275abd283c8b1e937014305d1b0e3
MD5 hash:
bc98e705b87e1165eeac32b5e5cdb332
SHA1 hash:
c10538177c826fe9a5121414914b5c942ae3fd92
SH256 hash:
16a422f72038d58a972f54201b0c2d05b4ddf7a21831006e55e320c74db26aee
MD5 hash:
206f9da62930605b2cb72dcf86c9d3fa
SHA1 hash:
bd4568b64c5abff1936a844644f0c21446b20caa
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments