MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1750f06e4ff7e39260edb619e43bc8bf4e349399d841c450391bb571aec04ec1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 1750f06e4ff7e39260edb619e43bc8bf4e349399d841c450391bb571aec04ec1
SHA3-384 hash: 55c66aa091079513b2ea40a73dc13d6f0248696b99960c4b295abe4cf373736696a7eb624ecdeb20381b8c73810d0000
SHA1 hash: 45fb8055f7d71057c61c5ceab2b4ae30f50fa5f3
MD5 hash: 0ce7258a3c94d9e122fce6320205aec1
humanhash: bacon-mike-louisiana-april
File name:1750f06e4ff7e39260edb619e43bc8bf4e349399d841c450391bb571aec04ec1
Download: download sample
Signature QuakBot
File size:1'084'416 bytes
First seen:2020-11-13 15:26:44 UTC
Last seen:2024-07-24 11:37:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c1e35a855d20d45e9c84f5bd029dd388 (154 x Quakbot)
ssdeep 6144:mpsZMe/9UxUIARD83dRkFICdy2RsQNbDrqZ31EyIEgfdx0tjKkLGInR+HlZzmU6s:m1qKxUhObxn2RxpeKaUUhulLhJ9FCe
TLSH A43522D7F9BC8471CAED297F8993123C968A85E85D05D10B0778A5ADBDF3200FE9244B
Reporter seifreed
Tags:Quakbot

Intelligence


File Origin
# of uploads :
2
# of downloads :
59
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Forced shutdown of a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-11-13 15:29:24 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
1750f06e4ff7e39260edb619e43bc8bf4e349399d841c450391bb571aec04ec1
MD5 hash:
0ce7258a3c94d9e122fce6320205aec1
SHA1 hash:
45fb8055f7d71057c61c5ceab2b4ae30f50fa5f3
SH256 hash:
f33e46f82a080fcf94a64e95f999741f0e10d1a8fe9eb7f55b5145f4936359c4
MD5 hash:
e02f74d3fc50a93e591a16b582af0cbf
SHA1 hash:
84a5c390158a56373eee6baa43cd6ce195d66edd
Detections:
win_qakbot_g0 win_qakbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments