MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3be3744c0ffb2f4495f0c4030ff8b52403f565baff099728d7c29fbafba5213f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 3be3744c0ffb2f4495f0c4030ff8b52403f565baff099728d7c29fbafba5213f
SHA3-384 hash: 9c5c5c2cf1c995ee2b1e7291dc09ed770b57bf1e92c0d4035eec180dc42b7811b1c29694a4df26c734345ca9f8d83e6d
SHA1 hash: b0d93ec943ceb35527db8c3aa1e611ee6c94f690
MD5 hash: 91a7acbec41b4d84e78fdf1d62b31b6a
humanhash: magazine-shade-hydrogen-kentucky
File name:3be3744c0ffb2f4495f0c4030ff8b52403f565baff099728d7c29fbafba5213f
Download: download sample
Signature QuakBot
File size:1'084'416 bytes
First seen:2020-11-06 00:47:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c1e35a855d20d45e9c84f5bd029dd388 (154 x Quakbot)
ssdeep 6144:KRawthaHqZIMRD83d5kFICdy2cs1NbDEWZ31EylEgf9RItjKkuGInR+HlZzmr6Mh:KR2qZtOzxn2cZ+aKTrUhulLhJ9FCe
Threatray 761 similar samples on MalwareBazaar
TLSH D93512D7F9BC8471CAED287F89A3523C968589E85D05D10B073869ADBDF3200BE9644B
Reporter seifreed
Tags:Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
53
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Threat name:
Win32.Trojan.QBot
Status:
Malicious
First seen:
2020-10-30 13:34:16 UTC
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan persistence
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Creates scheduled task(s)
Adds Run key to start application
Qakbot/Qbot
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments