MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1883a9b94e11a3db9aa0cd29d7864af6e45d93fb7f5c873b8256d36e648a289f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: 1883a9b94e11a3db9aa0cd29d7864af6e45d93fb7f5c873b8256d36e648a289f
SHA3-384 hash: 6b00c1f8bb187a987db0faf1502777839123622de859e0b6ed87e9c502ded7cc9002a9b6f6196355099c4805b0233b24
SHA1 hash: 04eb802e06f021785615fe3c3494aaef8b4b5b5e
MD5 hash: 97b71513e2bfc984227220b56fff6af1
humanhash: paris-diet-foxtrot-december
File name:RS42GR.zip
Download: download sample
Signature Quakbot
File size:623'768 bytes
First seen:2022-12-23 01:31:10 UTC
Last seen:2022-12-23 01:35:31 UTC
File type: zip
MIME type:application/zip
Note:This file is a password protected archive. The password is: U22
ssdeep 12288:Z0Y+fEwc8dM1dzxL4JWFA5H3Bfo8BUzOUPbatAenhQw5R9fntKRC4XjNgj:uYsRc0M1dVOW65Xpo8BKbbatASSCLf4k
TLSH T155D423F59571AD4E0FBFD3AC1E98DB5A34E20E9DF906B8B6D0D4BC50006006A99C97B3
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter proxylife
Tags:1671725928 BB11 pw-U22 Qakbot qbot Quakbot zip

Intelligence


File Origin
# of uploads :
4
# of downloads :
149
Origin country :
KY KY
File Archive Information

This file archive contains 6 file(s), sorted by their relevance:

File name:data.txt
File size:1'178 bytes
SHA256 hash: 0c9e21d3f16411d5b5faffde97575baeb085c3fbf7c4e71a80314fb23fbe7574
MD5 hash: 995ebaf2993238b6b1e64b95300c14f0
MIME type:text/plain
Signature Quakbot
File name:tenacious.png
File size:12'903 bytes
SHA256 hash: f53a8876612be9e2525aad891f2e4b7828786a208e3767c7b66aa6e5bc09adf6
MD5 hash: 4a9afc2addf20aaba11a06a81dc8b014
MIME type:image/png
Signature Quakbot
File name:header
File size:104'857'600 bytes
SHA256 hash: cd1f2a4b7893d1c70893ed2ba347e140d34bdcd2794097424083d9367fa5caa6
MD5 hash: 5937fb14ca678edd47fca8acbf0f12d0
MIME type:text/plain
Signature Quakbot
File name:soakaways.txt
File size:115'323 bytes
SHA256 hash: 06fd15f5f1768f4b160a589a65d7c75308e18ca306933e51ae0b6a2b4339759f
MD5 hash: dace88a340e7232ffc05ca1450dcc518
MIME type:text/plain
Signature Quakbot
File name:wrapped.txt
File size:1'409'024 bytes
SHA256 hash: 81ab97d432d1cc99dd1d7e7512015654872a754d75f3086fd6c69d0c5997c549
MD5 hash: c7ee212c9d7d9272fcc002f037fdfbd8
MIME type:text/plain
Signature Quakbot
File name:GR1.wsf
File size:449 bytes
SHA256 hash: f1aff1bcd1f09e683e350d65a1bffbe41f5e66ee006850827140f6fec54f8bd4
MD5 hash: e1de85b9145db19ec4f283c6f50cb9c6
MIME type:text/html
Signature Quakbot
Vendor Threat Intelligence
Gathering data
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:bb11 campaign:1671725928 banker stealer trojan
Behaviour
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Malware Config
C2 Extraction:
27.109.19.90:2078
50.68.204.71:995
217.43.16.149:443
181.118.206.65:995
152.171.41.171:443
98.187.21.2:443
121.121.100.148:995
87.252.106.197:995
172.90.139.138:2222
172.248.42.122:443
24.142.218.202:443
76.100.159.250:443
92.8.187.85:2222
69.133.162.35:443
50.86.217.209:443
78.18.42.55:443
92.27.86.48:2222
185.13.180.250:443
50.26.197.236:993
24.69.84.237:443
67.10.175.47:2222
12.172.173.82:993
12.172.173.82:990
189.222.74.224:443
73.155.10.79:443
86.178.217.180:443
91.254.132.23:443
87.223.84.92:443
190.35.44.194:443
92.207.132.174:2222
12.172.173.82:20
91.169.12.198:32100
81.229.117.95:2222
142.161.27.232:2222
77.124.17.122:443
90.104.22.28:2222
125.20.112.94:443
174.104.184.149:443
86.160.253.56:443
86.130.9.250:2222
24.71.120.191:443
198.2.51.242:993
86.222.191.162:2222
50.68.204.71:993
201.244.108.183:995
71.31.101.183:443
74.33.196.114:443
37.14.229.220:2222
94.30.98.134:32100
2.14.96.234:2222
46.10.198.106:443
78.101.91.215:2222
86.183.251.169:2222
79.77.142.22:2222
12.172.173.82:22
12.172.173.82:32101
173.178.151.233:443
98.145.23.67:443
86.225.214.138:2222
173.18.126.3:443
75.98.154.19:443
74.92.243.113:50000
92.239.81.124:443
90.66.229.185:2222
74.66.134.24:443
73.161.176.218:443
184.68.116.146:61202
85.59.61.52:2222
184.176.154.83:995
86.96.75.237:2222
90.162.45.154:2222
51.199.123.42:443
82.36.36.76:443
193.154.124.4:443
70.51.134.110:2222
109.11.175.42:2222
62.35.67.88:443
78.92.133.215:443
213.67.255.57:2222
103.231.104.124:443
151.65.216.129:443
47.61.51.44:2078
47.203.227.114:443
90.4.190.217:2222
192.164.157.52:995
75.99.125.238:2222
31.167.254.199:995
175.139.207.179:2222
184.153.132.82:443
208.180.17.32:2222
193.251.52.34:2222
84.113.121.103:443
75.156.125.215:995
136.35.241.159:443
82.31.37.241:995
37.15.128.31:2222
176.142.207.63:443
178.142.126.181:443
93.147.134.85:443
184.68.116.146:3389
184.68.116.146:2222
66.191.69.18:995
47.16.68.188:2222
92.189.214.236:2222
73.29.92.128:443
176.44.58.217:995
67.61.71.201:443
184.189.41.80:443
65.95.85.172:2222
199.83.165.233:443
12.172.173.82:995
12.172.173.82:50001
67.235.138.14:443
47.34.30.133:443
76.170.252.153:995
12.172.173.82:21
75.143.236.149:443
82.9.210.36:443
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PassProtected_ZIP_ISO_file
Author:_jc
Description:Detects container formats commonly smuggled through password-protected zips

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments