MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 182d599918881d3a50d89f8cea088ce58b899cfde3d611971d351810ad8b5850. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 5


Intelligence 5 IOCs YARA 3 File information Comments

SHA256 hash: 182d599918881d3a50d89f8cea088ce58b899cfde3d611971d351810ad8b5850
SHA3-384 hash: 66b638f495d44c6338038f0c770c99e7d0b5e06ba7f458595fb84211ab1d46c522ff9de3551c61491ca570197d035913
SHA1 hash: b45889a618090d92655c30801f4cc8ce7d8af081
MD5 hash: f8e19058aaa599005e92299164b6cc59
humanhash: fanta-bacon-spaghetti-autumn
File name:Agreement#9999.html
Download: download sample
Signature Quakbot
File size:650'974 bytes
First seen:2022-11-18 15:48:30 UTC
Last seen:Never
File type: html
MIME type:text/html
ssdeep 6144:l26ofdPpDkkcwNmOWhrqwnkuiYfZZ+BfuBntV4RD+86yuRCbtj+X+yiDkjvC+QpZ:o5djXUQuPyuBR1Yt++Kecvx2zqwJ
TLSH T194D40214CA589F78CFE8AA1C50FE131D93F04C5A4066A5C6AF9BBD07AFABD04421F5E4
Reporter pr0xylife
Tags:html obama223 Qakbot qbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
269
Origin country :
RU RU
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
qbot
Result
Verdict:
SUSPICIOUS
Details
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Result
Threat name:
HtmlDropper, Qbot
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
HTML document with suspicious name
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses 7zip to decompress a password protected archive
Writes to foreign memory regions
Yara detected Html Dropper
Yara detected Qbot
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 749355 Sample: Agreement#9999.html Startdate: 18/11/2022 Architecture: WINDOWS Score: 88 40 71.31.101.183 WINDSTREAMUS United States 2->40 42 94.63.65.146 VODAFONE-PTVodafonePortugalPT Portugal 2->42 44 92 other IPs or domains 2->44 56 Yara detected Html Dropper 2->56 58 Yara detected Qbot 2->58 60 HTML document with suspicious name 2->60 62 2 other signatures 2->62 10 chrome.exe 18 8 2->10         started        13 chrome.exe 2->13         started        signatures3 process4 dnsIp5 52 192.168.2.1 unknown unknown 10->52 54 239.255.255.250 unknown Reserved 10->54 15 unarchiver.exe 4 5 10->15         started        18 chrome.exe 10->18         started        process6 dnsIp7 72 Uses 7zip to decompress a password protected archive 15->72 21 wscript.exe 1 15->21         started        23 cmd.exe 1 15->23         started        25 7za.exe 2 15->25         started        27 notepad.exe 15->27         started        46 www.google.com 142.250.184.228, 443, 49712, 49747 GOOGLEUS United States 18->46 48 clients.l.google.com 142.250.185.110, 443, 49707 GOOGLEUS United States 18->48 50 3 other IPs or domains 18->50 signatures8 process9 process10 29 regsvr32.exe 21->29         started        32 powershell.exe 36 23->32         started        34 conhost.exe 23->34         started        36 conhost.exe 25->36         started        signatures11 64 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 29->64 66 Writes to foreign memory regions 29->66 68 Allocates memory in foreign processes 29->68 70 Maps a DLL or memory area into another process 29->70 38 wermgr.exe 8 1 29->38         started        process12
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:MAL_QBot_HTML_Smuggling_Indicators_Oct22_1
Author:Florian Roth
Description:Detects double encoded PKZIP headers as seen in HTML files used by QBot
Reference:https://twitter.com/ankit_anubhav/status/1578257383133876225?s=20&t=Bu3CCJCzImpTGOQX_KGsdA
Rule name:QbotStuff
Author:anonymous

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments