MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2c84012e233c6b20375f1f0712f615154709d40df1847879ed5758bc5b0d339d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Squirrelwaffle


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 2c84012e233c6b20375f1f0712f615154709d40df1847879ed5758bc5b0d339d
SHA3-384 hash: 30253faee540c5933d841e5aebb01d8dcc80a51c78f313d6eada6cc72bfdf25990da6f1352cc5a6afe814b1dda4ee3b0
SHA1 hash: 5b6f0201f8254a56ca7a3f388367dbc74673dd27
MD5 hash: 3d3c017c7c99c90432bffe11332a1faf
humanhash: stairway-mountain-twenty-oranges
File name:3d3c017c7c99c90432bffe11332a1faf.dll
Download: download sample
Signature Squirrelwaffle
File size:322'611 bytes
First seen:2021-09-25 12:42:33 UTC
Last seen:2021-09-25 14:08:02 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 6527345f9aee9363b094aad01304de88 (4 x Squirrelwaffle, 1 x Quakbot)
ssdeep 6144:9/st+16ZWiobj+n5QZRO0Xj/Ee+aRLvccAOPyI:A+QoOaEFA7RD
Threatray 154 similar samples on MalwareBazaar
TLSH T13864F6A5BD4D8C33FDD8363152836E1C691A3BD3B16C328F326EF6146967F44A892E50
File icon (PE):PE icon
dhash icon 88a8a08c8c8ea8a8 (5 x Squirrelwaffle, 4 x Formbook, 3 x ArkeiStealer)
Reporter abuse_ch
Tags:dll SQUIRRELWAFFLE

Intelligence


File Origin
# of uploads :
2
# of downloads :
152
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
92 / 100
Signature
Allocates memory in foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sigma detected: Regsvr32 Command Line Without DLL
Sigma detected: Schedule system process
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 490458 Sample: dhcBplmzz8.dll Startdate: 25/09/2021 Architecture: WINDOWS Score: 92 42 Multi AV Scanner detection for submitted file 2->42 44 Sigma detected: Schedule system process 2->44 46 Machine Learning detection for sample 2->46 48 2 other signatures 2->48 10 loaddll32.exe 1 2->10         started        13 regsvr32.exe 2->13         started        15 regsvr32.exe 2->15         started        process3 signatures4 52 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 10->52 54 Injects code into the Windows Explorer (explorer.exe) 10->54 56 Maps a DLL or memory area into another process 10->56 17 cmd.exe 1 10->17         started        19 explorer.exe 10->19         started        22 regsvr32.exe 13->22         started        24 regsvr32.exe 15->24         started        process5 signatures6 26 rundll32.exe 17->26         started        50 Uses schtasks.exe or at.exe to add and modify task schedules 19->50 29 WerFault.exe 20 9 22->29         started        31 WerFault.exe 9 24->31         started        process7 signatures8 58 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 26->58 60 Injects code into the Windows Explorer (explorer.exe) 26->60 62 Writes to foreign memory regions 26->62 64 2 other signatures 26->64 33 explorer.exe 8 1 26->33         started        process9 file10 40 C:\Users\user\Desktop\dhcBplmzz8.dll, PE32 33->40 dropped 36 schtasks.exe 1 33->36         started        process11 process12 38 conhost.exe 36->38         started       
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2021-09-25 12:43:09 UTC
AV detection:
24 of 45 (53.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:tr campaign:1632152742 banker stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Loads dropped DLL
Qakbot/Qbot
Malware Config
C2 Extraction:
45.46.53.140:2222
144.139.47.206:443
189.210.115.207:443
120.150.218.241:995
47.22.148.6:443
140.82.49.12:443
24.139.72.117:443
24.229.150.54:995
24.55.112.61:443
136.232.34.70:443
95.77.223.148:443
173.21.10.71:2222
76.25.142.196:443
96.37.113.36:993
71.74.12.34:443
73.151.236.31:443
67.165.206.193:993
109.12.111.14:443
68.204.7.158:443
105.198.236.99:443
75.188.35.168:443
216.201.162.158:443
196.218.227.241:995
185.250.148.74:2222
81.214.126.173:2222
68.186.192.69:443
72.252.201.69:443
92.59.35.196:2222
24.152.219.253:995
50.29.166.232:995
75.67.192.125:443
24.95.61.62:443
73.25.124.140:2222
27.223.92.142:995
64.121.114.87:443
151.205.102.42:443
72.240.200.181:2222
75.137.47.174:443
45.32.211.207:995
45.32.211.207:8443
149.28.98.196:2222
149.28.98.196:995
207.246.77.75:8443
45.63.107.192:995
149.28.99.97:443
45.77.117.108:2222
149.28.99.97:2222
45.32.211.207:2222
45.63.107.192:443
149.28.101.90:443
149.28.101.90:8443
149.28.99.97:995
96.253.46.210:443
83.196.56.65:2222
45.77.115.208:2222
45.77.115.208:8443
45.77.115.208:443
144.202.38.185:443
144.202.38.185:2222
45.32.211.207:443
144.202.38.185:995
149.28.98.196:443
149.28.101.90:2222
45.77.117.108:443
207.246.77.75:995
207.246.77.75:443
207.246.77.75:2222
149.28.101.90:995
45.77.117.108:995
45.77.117.108:8443
45.77.115.208:995
71.163.222.223:443
90.87.245.154:2222
207.246.116.237:995
207.246.116.237:443
45.63.107.192:2222
207.246.116.237:8443
207.246.116.237:2222
24.179.77.236:443
184.185.103.157:443
217.165.164.110:2222
213.122.113.120:443
193.248.221.184:2222
188.27.179.172:443
222.153.169.147:995
100.2.20.137:443
172.78.42.79:443
97.69.160.4:2222
105.198.236.101:443
98.192.185.86:443
186.144.33.73:443
96.61.23.88:995
86.220.60.247:2222
71.41.184.10:3389
175.143.92.16:443
46.149.81.250:443
98.252.118.134:443
92.96.3.180:2078
71.187.170.235:443
50.244.112.106:443
24.122.118.18:443
47.196.213.73:443
186.154.175.13:443
70.163.161.79:443
78.63.226.32:443
76.168.147.166:993
77.27.207.217:995
31.4.242.28:995
125.62.192.195:443
195.12.154.8:443
96.21.251.127:2222
71.199.192.62:443
70.168.130.172:995
82.12.157.95:995
209.210.187.52:995
209.210.187.52:443
67.6.12.4:443
189.222.59.177:443
174.104.22.30:443
142.117.191.18:2222
189.146.183.105:443
213.60.147.140:443
196.221.207.137:995
108.46.145.30:443
187.250.238.164:995
2.7.116.188:2222
195.43.173.70:443
106.250.150.98:443
45.67.231.247:443
83.110.103.152:443
83.110.9.71:2222
78.97.207.104:443
59.90.246.200:443
80.227.5.69:443
125.63.101.62:443
86.236.77.68:2222
109.106.69.138:2222
84.72.35.226:443
217.133.54.140:32100
197.161.154.132:443
89.137.211.239:995
74.222.204.82:995
122.148.156.131:995
156.223.110.23:443
144.139.166.18:443
202.185.166.181:443
76.94.200.148:995
71.63.120.101:443
196.151.252.84:443
202.188.138.162:443
Unpacked files
SH256 hash:
8df2692df2b95349c8d548433aefc56547f81fc040818fb67b3493d723906127
MD5 hash:
de8156bbac93c29b606c25c6724dfe86
SHA1 hash:
50446acb6b8604a5129aa1a13079de94cf8b2fd7
SH256 hash:
2c84012e233c6b20375f1f0712f615154709d40df1847879ed5758bc5b0d339d
MD5 hash:
3d3c017c7c99c90432bffe11332a1faf
SHA1 hash:
5b6f0201f8254a56ca7a3f388367dbc74673dd27
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Squirrelwaffle

DLL dll 2c84012e233c6b20375f1f0712f615154709d40df1847879ed5758bc5b0d339d

(this sample)

  
Delivery method
Distributed via web download

Comments