MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 30ba48c675fe81437d78a25384a4c07e357577a58fe63cea022f0847e61e71b1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Quakbot
Vendor detections: 11
| SHA256 hash: | 30ba48c675fe81437d78a25384a4c07e357577a58fe63cea022f0847e61e71b1 |
|---|---|
| SHA3-384 hash: | dd162c5617cb58ae088903061805bb55bb7281dc633e722d7d0bfd2f973b5301e9894f3aa80bb8d79a05f2e1a065c656 |
| SHA1 hash: | 09375663f13fc80966a6ed6cc7a703b096664ea3 |
| MD5 hash: | 705aa22abcf9c66bfe8592db5456e25f |
| humanhash: | fourteen-jig-crazy-harry |
| File name: | kilketh.tmp |
| Download: | download sample |
| Signature | Quakbot |
| File size: | 508'928 bytes |
| First seen: | 2022-12-07 11:53:27 UTC |
| Last seen: | 2022-12-07 13:37:55 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 94498d45a86cba717bb6d41b385bb4f8 (2 x Quakbot) |
| ssdeep | 6144:kc0+H0LwX/ei0iPlJgQwggr6cAhMtnEbER8wvyRaY4als1yc8UQw8Mz1fu:D06cilJy9tnY+yTLm8UQw8Mzxu |
| Threatray | 1'818 similar samples on MalwareBazaar |
| TLSH | T129B448CCA5C0973BE46A047D752892348B286C63177A49BF6F537AFF1AB0391A235D13 |
| TrID | 45.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.4% (.EXE) Win64 Executable (generic) (10523/12/4) 9.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.6% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 11f0f892ccecf070 (5 x Quakbot) |
| Reporter | |
| Tags: | 1670238005 BB09 dll Qakbot Quakbot |
Intelligence
File Origin
IEVendor Threat Intelligence
Result
Result
Details
Result
Behaviour
Malware Config
66.191.69.18:995
186.64.67.9:443
50.90.249.161:443
109.150.179.158:2222
92.149.205.238:2222
86.165.15.180:2222
41.44.19.36:995
78.17.157.5:443
173.18.126.3:443
75.99.125.235:2222
172.90.139.138:2222
27.99.45.237:2222
91.68.227.219:443
12.172.173.82:993
103.144.201.62:2078
12.172.173.82:990
173.239.94.212:443
91.169.12.198:32100
24.64.114.59:2222
74.66.134.24:443
93.164.248.234:443
83.92.85.93:443
78.69.251.252:2222
190.134.138.61:443
2.99.47.198:2222
73.223.248.31:443
12.172.173.82:995
94.63.65.146:443
80.13.179.151:2222
70.120.228.205:2083
216.196.245.102:2078
31.167.254.199:995
89.129.109.27:2222
69.119.123.159:2222
91.254.230.18:443
64.121.161.102:443
38.166.242.12:2087
12.172.173.82:465
75.143.236.149:443
81.229.117.95:2222
74.92.243.113:50000
183.82.100.110:2222
75.98.154.19:443
193.154.202.210:443
121.122.99.223:995
70.115.104.126:995
213.67.255.57:2222
213.91.235.146:443
37.14.229.220:2222
76.80.180.154:995
62.31.130.138:465
89.115.196.99:443
2.83.12.243:443
85.152.152.46:443
188.48.123.229:995
90.104.22.28:2222
201.210.107.223:993
47.41.154.250:443
50.68.204.71:995
84.215.202.22:443
85.241.180.94:443
92.189.214.236:2222
103.55.67.180:443
90.89.95.158:2222
86.217.250.15:2222
72.68.175.55:2222
86.190.16.164:443
136.244.25.165:443
65.30.139.145:995
73.161.176.218:443
199.83.165.233:443
98.145.23.67:443
84.35.26.14:995
24.64.114.59:3389
50.68.204.71:443
102.46.139.82:993
71.247.10.63:995
149.126.159.106:443
58.162.223.233:443
216.196.245.102:2083
184.155.91.69:443
87.99.116.47:443
81.131.210.167:443
103.141.50.117:995
184.176.154.83:995
92.207.132.174:2222
142.161.27.232:2222
176.142.207.63:443
184.153.132.82:443
108.6.249.139:443
69.133.162.35:443
76.20.42.45:443
139.216.164.122:443
24.206.27.39:443
12.172.173.82:21
77.86.98.236:443
50.68.204.71:993
88.126.94.4:50000
85.245.221.87:2078
190.206.70.80:2222
87.221.197.110:2222
83.7.54.186:443
87.223.91.46:443
78.100.230.10:995
181.164.194.228:443
174.101.111.4:443
75.115.14.189:443
86.225.214.138:2222
58.247.115.126:995
86.96.75.237:2222
105.103.56.28:2078
198.2.51.242:993
174.104.184.149:443
105.103.56.28:990
24.64.114.59:61202
93.24.192.142:20
2.14.82.210:2222
90.116.219.167:2222
Unpacked files
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.