MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 30ba48c675fe81437d78a25384a4c07e357577a58fe63cea022f0847e61e71b1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: 30ba48c675fe81437d78a25384a4c07e357577a58fe63cea022f0847e61e71b1
SHA3-384 hash: dd162c5617cb58ae088903061805bb55bb7281dc633e722d7d0bfd2f973b5301e9894f3aa80bb8d79a05f2e1a065c656
SHA1 hash: 09375663f13fc80966a6ed6cc7a703b096664ea3
MD5 hash: 705aa22abcf9c66bfe8592db5456e25f
humanhash: fourteen-jig-crazy-harry
File name:kilketh.tmp
Download: download sample
Signature Quakbot
File size:508'928 bytes
First seen:2022-12-07 11:53:27 UTC
Last seen:2022-12-07 13:37:55 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 94498d45a86cba717bb6d41b385bb4f8 (2 x Quakbot)
ssdeep 6144:kc0+H0LwX/ei0iPlJgQwggr6cAhMtnEbER8wvyRaY4als1yc8UQw8Mz1fu:D06cilJy9tnY+yTLm8UQw8Mzxu
Threatray 1'818 similar samples on MalwareBazaar
TLSH T129B448CCA5C0973BE46A047D752892348B286C63177A49BF6F537AFF1AB0391A235D13
TrID 45.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.4% (.EXE) Win64 Executable (generic) (10523/12/4)
9.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.6% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 11f0f892ccecf070 (5 x Quakbot)
Reporter pr0xylife
Tags:1670238005 BB09 dll Qakbot Quakbot

Intelligence


File Origin
# of uploads :
2
# of downloads :
212
Origin country :
IE IE
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2022-12-07 11:54:19 UTC
File Type:
PE (Dll)
Extracted files:
20
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:bb09 campaign:1670238005 banker stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Qakbot/Qbot
Malware Config
C2 Extraction:
76.100.159.250:443
66.191.69.18:995
186.64.67.9:443
50.90.249.161:443
109.150.179.158:2222
92.149.205.238:2222
86.165.15.180:2222
41.44.19.36:995
78.17.157.5:443
173.18.126.3:443
75.99.125.235:2222
172.90.139.138:2222
27.99.45.237:2222
91.68.227.219:443
12.172.173.82:993
103.144.201.62:2078
12.172.173.82:990
173.239.94.212:443
91.169.12.198:32100
24.64.114.59:2222
74.66.134.24:443
93.164.248.234:443
83.92.85.93:443
78.69.251.252:2222
190.134.138.61:443
2.99.47.198:2222
73.223.248.31:443
12.172.173.82:995
94.63.65.146:443
80.13.179.151:2222
70.120.228.205:2083
216.196.245.102:2078
31.167.254.199:995
89.129.109.27:2222
69.119.123.159:2222
91.254.230.18:443
64.121.161.102:443
38.166.242.12:2087
12.172.173.82:465
75.143.236.149:443
81.229.117.95:2222
74.92.243.113:50000
183.82.100.110:2222
75.98.154.19:443
193.154.202.210:443
121.122.99.223:995
70.115.104.126:995
213.67.255.57:2222
213.91.235.146:443
37.14.229.220:2222
76.80.180.154:995
62.31.130.138:465
89.115.196.99:443
2.83.12.243:443
85.152.152.46:443
188.48.123.229:995
90.104.22.28:2222
201.210.107.223:993
47.41.154.250:443
50.68.204.71:995
84.215.202.22:443
85.241.180.94:443
92.189.214.236:2222
103.55.67.180:443
90.89.95.158:2222
86.217.250.15:2222
72.68.175.55:2222
86.190.16.164:443
136.244.25.165:443
65.30.139.145:995
73.161.176.218:443
199.83.165.233:443
98.145.23.67:443
84.35.26.14:995
24.64.114.59:3389
50.68.204.71:443
102.46.139.82:993
71.247.10.63:995
149.126.159.106:443
58.162.223.233:443
216.196.245.102:2083
184.155.91.69:443
87.99.116.47:443
81.131.210.167:443
103.141.50.117:995
184.176.154.83:995
92.207.132.174:2222
142.161.27.232:2222
176.142.207.63:443
184.153.132.82:443
108.6.249.139:443
69.133.162.35:443
76.20.42.45:443
139.216.164.122:443
24.206.27.39:443
12.172.173.82:21
77.86.98.236:443
50.68.204.71:993
88.126.94.4:50000
85.245.221.87:2078
190.206.70.80:2222
87.221.197.110:2222
83.7.54.186:443
87.223.91.46:443
78.100.230.10:995
181.164.194.228:443
174.101.111.4:443
75.115.14.189:443
86.225.214.138:2222
58.247.115.126:995
86.96.75.237:2222
105.103.56.28:2078
198.2.51.242:993
174.104.184.149:443
105.103.56.28:990
24.64.114.59:61202
93.24.192.142:20
2.14.82.210:2222
90.116.219.167:2222
Unpacked files
SH256 hash:
a96db824dcde339ae8df3259934cd886027053075797e35ee48d5dbbac37f34e
MD5 hash:
ac20abc415817fa6008bf473b7d61e2d
SHA1 hash:
1bbbe69455ec7bead0925cea323a9526b6475a96
Detections:
Qakbot win_qakbot_auto
SH256 hash:
30ba48c675fe81437d78a25384a4c07e357577a58fe63cea022f0847e61e71b1
MD5 hash:
705aa22abcf9c66bfe8592db5456e25f
SHA1 hash:
09375663f13fc80966a6ed6cc7a703b096664ea3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments