MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 309bca5d9fde32746cd61a7ea4b2da3ef8f6cf2de57ee40e835c1b26237c991a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: 309bca5d9fde32746cd61a7ea4b2da3ef8f6cf2de57ee40e835c1b26237c991a
SHA3-384 hash: 003e5ce24f0c94e4915279cd1bcd5bc07ffcba3c55f041c5f048c308e69a27505421f1aacd8c5cb89623475c772a6aab
SHA1 hash: 61d093719b8c298dbe49b12330d88a3a945fbc81
MD5 hash: 5e04c555d728f85c511d22d2cd78a355
humanhash: eight-connecticut-nitrogen-emma
File name:5e04c555d728f85c511d22d2cd78a355
Download: download sample
Signature Quakbot
File size:348'624 bytes
First seen:2021-01-27 16:06:44 UTC
Last seen:2021-01-27 18:06:53 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash e4f3da5a8792a560339df022f8639dcd (1 x Quakbot)
ssdeep 6144:FwIeEesNsv3wU7HuAmHKmlEwrPmRPWEpWFn2E6lyDntvhhOU35RCK:6IeETmByqTwr03pdf8vhhOKR
Threatray 59 similar samples on MalwareBazaar
TLSH AD748D396A26D063D27C27B183C3DB441E67EAD57234441622B3DE183EF62A5BE36F14
Reporter lazyactivist192
Tags:abc121 dll Qakbot qbot Quakbot REIGN BROS ApS signed

Code Signing Certificate

Organisation:REIGN BROS ApS
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Jan 21 00:00:00 2021 GMT
Valid to:Jan 21 23:59:59 2022 GMT
Serial number: D4EF1AB6AB5D3CB35E4EFB7984DEF7A2
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: E535E3423F0EA4252A3ADD50281D00C73393E9C6A618C46BFBFB5F24EADF3471
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
255
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Launching a process
Modifying an executable file
Creating a process with a hidden window
Creating a window
Sending a UDP request
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Infostealer.QBot
Status:
Malicious
First seen:
2021-01-27 16:07:04 UTC
File Type:
PE (Dll)
AV detection:
14 of 27 (51.85%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:abc121 campaign:1611757837 banker stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Suspicious use of AdjustPrivilegeToken
Program crash
Loads dropped DLL
Qakbot/Qbot
Malware Config
C2 Extraction:
75.136.40.155:443
79.129.121.81:995
86.236.77.68:2222
98.240.24.57:443
202.186.176.15:443
172.87.134.226:995
105.198.236.101:443
144.139.47.206:443
68.225.60.77:995
83.110.12.140:2222
213.60.147.140:443
85.132.36.111:2222
2.50.153.20:2222
105.198.236.99:443
196.151.252.84:443
184.179.14.130:22
197.45.110.165:995
24.43.22.218:993
67.6.91.75:443
75.67.192.125:443
108.46.145.30:443
2.7.69.217:2222
80.11.5.65:2222
72.240.200.181:2222
72.252.201.69:443
37.211.83.41:443
188.25.63.105:443
71.182.142.63:443
81.97.154.100:443
84.247.55.190:8443
24.229.150.54:995
172.78.30.215:443
108.190.151.108:2222
98.121.187.78:443
190.85.91.154:443
83.110.108.181:2222
95.77.223.148:443
77.211.30.202:995
172.115.177.204:2222
181.48.190.78:443
77.27.174.49:995
45.32.211.207:8443
45.32.211.207:443
149.28.98.196:995
149.28.99.97:995
45.63.107.192:443
144.202.38.185:995
207.246.116.237:443
207.246.116.237:2222
149.28.98.196:443
144.202.38.185:443
45.63.107.192:2222
149.28.101.90:2222
149.28.99.97:2222
45.63.107.192:995
207.246.77.75:995
207.246.77.75:2222
45.32.211.207:995
149.28.99.97:443
149.28.101.90:8443
45.77.115.208:443
207.246.77.75:8443
207.246.116.237:8443
207.246.77.75:443
144.202.38.185:2222
207.246.116.237:995
149.28.101.90:995
45.32.211.207:2222
149.28.101.90:443
82.12.157.95:995
45.77.115.208:2222
149.28.98.196:2222
80.227.5.70:443
217.133.54.140:32100
193.248.221.184:2222
184.189.122.72:443
78.63.226.32:443
106.51.52.111:443
45.77.115.208:995
45.77.115.208:8443
92.59.35.196:2222
84.72.35.226:443
47.22.148.6:443
83.110.102.100:443
172.87.157.235:3389
50.240.77.238:22
197.161.154.132:443
24.50.118.93:443
151.60.15.183:443
175.141.219.71:443
84.232.252.202:2222
85.58.200.50:2222
186.155.151.167:443
64.121.114.87:443
24.139.72.117:443
109.106.69.138:2222
78.182.229.147:443
89.3.198.238:443
2.50.2.216:443
176.181.247.197:443
140.82.49.12:443
209.210.187.52:995
86.98.93.124:2078
96.37.113.36:993
68.186.192.69:443
41.205.16.192:443
216.201.162.158:443
71.187.170.235:443
46.153.36.53:995
94.53.92.42:443
105.186.102.16:443
50.244.112.106:443
136.232.34.70:443
31.5.21.66:995
203.198.96.37:443
188.24.128.253:443
82.76.47.211:443
160.3.187.114:443
115.133.243.6:443
76.25.142.196:443
45.46.53.140:2222
106.250.150.98:443
50.29.166.232:995
173.21.10.71:2222
71.74.12.34:443
41.234.12.32:443
144.139.166.18:443
47.156.65.184:443
122.148.156.131:995
125.239.152.76:995
189.210.115.207:443
76.111.128.194:443
71.197.126.250:443
75.136.26.147:443
74.68.144.202:443
69.123.179.70:443
202.188.138.162:443
199.19.117.131:443
189.222.111.204:443
209.210.187.52:443
189.237.7.9:443
151.205.102.42:443
86.220.60.133:2222
75.118.1.141:443
109.12.111.14:443
187.250.45.81:995
47.196.192.184:443
182.69.149.225:2087
89.137.211.239:995
2.232.253.79:995
Unpacked files
SH256 hash:
fbfaf1b99df83675039a9e87145f30556cadec245901f07a2ccfe2b19e8c60d7
MD5 hash:
81143134b62467eff10f03c997fc4263
SHA1 hash:
a1c9c9e9c4764518fa924f2844d0198657f8dfcf
SH256 hash:
309bca5d9fde32746cd61a7ea4b2da3ef8f6cf2de57ee40e835c1b26237c991a
MD5 hash:
5e04c555d728f85c511d22d2cd78a355
SHA1 hash:
61d093719b8c298dbe49b12330d88a3a945fbc81
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:QakBot
Author:kevoreilly
Description:QakBot Payload
Rule name:qbot_bin
Author:James_inthe_box
Description:Qbot Qakbot
Reference:https://app.any.run/tasks/b89d7454-403c-4c81-95db-7ecbba38eb02
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments