MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 26c106b25d01fae3d0b94af6286d755175af9cf28b99c0b4453548ac375ce890. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 26c106b25d01fae3d0b94af6286d755175af9cf28b99c0b4453548ac375ce890
SHA3-384 hash: 40c9f0142174be96f9de4939c54c9bbae4f3895a9c2e9d318ad8f275b66c2f2a6a67ddf1d710b371d39600364d8a2f6e
SHA1 hash: 411b72125755afae13c800bd5c25167842399c2c
MD5 hash: 03c8f3a685bf1a5796108065d7254cb6
humanhash: black-purple-spring-may
File name:26c106b25d01fae3d0b94af6286d755175af9cf28b99c0b4453548ac375ce890
Download: download sample
Signature QuakBot
File size:1'084'416 bytes
First seen:2020-11-15 23:14:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c1e35a855d20d45e9c84f5bd029dd388 (154 x Quakbot)
ssdeep 6144:fRDPwH7kko2IARD83dtkFICdy2MsGNbDZRZ31EybEgfdfktjKk3GInR+HlZzmf6s:fRavo2hOHxn2MO2uK+fUhulLhJ9FCe
Threatray 1'584 similar samples on MalwareBazaar
TLSH 373522D7F9BC8471CAED297F8993123C968A85E85D05D10B0778A5ADBDF3200FE9244B
Reporter seifreed
Tags:Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Sending a UDP request
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Forced shutdown of a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-11-15 23:17:47 UTC
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
26c106b25d01fae3d0b94af6286d755175af9cf28b99c0b4453548ac375ce890
MD5 hash:
03c8f3a685bf1a5796108065d7254cb6
SHA1 hash:
411b72125755afae13c800bd5c25167842399c2c
SH256 hash:
20f5194643a00a78cf194faf66d8bcfee937be791b24cbaa2651d32fc87038dd
MD5 hash:
f272927be747186e6a2924a9db05399c
SHA1 hash:
0e47210734d446929e25ce901ddd5f4f9d945547
Detections:
win_qakbot_g0 win_qakbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments