MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 246a1e2b03061fe58576567a470a0a8400502d384e558565c9124070ff71f1a2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 246a1e2b03061fe58576567a470a0a8400502d384e558565c9124070ff71f1a2
SHA3-384 hash: a85fc848128f1a7d26caf9f8d69c386818288bda0cb73c58ee7538c61e6b38ab9d31f28436cba7499133f0f5c3776596
SHA1 hash: 5e1e2d03a1ec7656d7e632f7afa70c500a001653
MD5 hash: 3c2f25592abe967f3c6e9891ddcf08d4
humanhash: mars-burger-sad-early
File name:246a1e2b03061fe58576567a470a0a8400502d384e558565c9124070ff71f1a2
Download: download sample
Signature QuakBot
File size:1'226'240 bytes
First seen:2020-11-15 22:36:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 65b7e4d2b8f7b3cf1dfc4bed557e0068 (13 x Quakbot)
ssdeep 6144:qQLmlMSY76DEoS5rYU/LPlbuo2YILNkFVZ5VfUllOp2n2FxHot1WL+Lwb5tJR7:5j6AoS5EU/Lp56kBgXOInmNouL+Lwb55
TLSH CF45D10DB737C000D3A62FF605924B98E66FA8E93B2191075BCA670D3DF93E57827589
Reporter seifreed
Tags:Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
64
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-11-15 22:37:15 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
246a1e2b03061fe58576567a470a0a8400502d384e558565c9124070ff71f1a2
MD5 hash:
3c2f25592abe967f3c6e9891ddcf08d4
SHA1 hash:
5e1e2d03a1ec7656d7e632f7afa70c500a001653
SH256 hash:
4edc29614bcb2b5f7aaed2ec9c9fd6598d4ce6e0b4242b6c404e8c05d3320bf8
MD5 hash:
68f4feaf8c828999dd9f7fbcc7442073
SHA1 hash:
43333200307746aadbdcd9099ee0a857a1e099ae
Detections:
win_qakbot_g0 win_qakbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments