MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3f3efd6c40d562ef37c921c7aa9e710c743638acc2d16580e1a560060142fc68. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 11


Intelligence 11 IOCs YARA 6 File information Comments

SHA256 hash: 3f3efd6c40d562ef37c921c7aa9e710c743638acc2d16580e1a560060142fc68
SHA3-384 hash: 9dcb44b4f052bade25d97fbd55034275f9b381c9cb49496490f6689d3d1e9ca26a5343e2d56d9da636bfd6d36849abec
SHA1 hash: 4770851128972bb1955a36d13e97d444e988a861
MD5 hash: 2135477510d718180c3261dc1dbfa403
humanhash: mexico-fruit-cardinal-william
File name:humors.dat
Download: download sample
Signature Quakbot
File size:1'404'928 bytes
First seen:2022-10-10 13:42:27 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 785da9c54c1d786e59e79db4a3337c6b (2 x Quakbot)
ssdeep 12288:XYKepSeIUqeXPwyITtxGvvVeHTe7ezGNTTYmRs867u0iROkDQStu8ahKFaXjGOyz:oLo2ftMzeaKYKu7u0i9UNj26Mn
Threatray 1'508 similar samples on MalwareBazaar
TLSH T1FE556C22BE9E8873C47B2A389D2B6358583A7D103A38585B6BF50D4CCF397407D6539B
TrID 62.7% (.EXE) InstallShield setup (43053/19/16)
14.5% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
6.5% (.EXE) Win32 Executable (generic) (4505/5/1)
4.3% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
3.0% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 399998ecd4d46c0e (572 x Quakbot, 137 x ArkeiStealer, 82 x GCleaner)
Reporter pr0xylife
Tags:dll obama211 Qakbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
227
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Launching a process
Searching for synchronization primitives
Modifying an executable file
Sending a custom TCP request
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware keylogger
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2022-10-10 13:43:19 UTC
File Type:
PE (Dll)
Extracted files:
140
AV detection:
17 of 26 (65.38%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Program crash
Qakbot/Qbot
Malware Config
C2 Extraction:
221.44.158.12:15899
135.59.24.163:19546
94.7.79.144:54878
227.150.243.114:39154
215.194.96.116:37650
45.64.184.122:25478
85.137.184.169:59234
107.26.25.92:56712
226.156.21.185:57237
29.90.187.89:14834
206.16.38.205:59801
155.151.97.59:36109
47.219.184.104:36930
252.7.46.182:4067
140.243.25.205:24064
94.93.131.253:65187
28.236.43.99:25246
110.175.218.118:43672
159.220.92.54:39126
233.60.229.213:1774
40.238.73.215:25641
168.152.8.85:14726
51.27.237.220:643
38.179.148.136:10087
155.35.214.28:45472
174.73.95.203:57098
253.87.188.28:55082
146.111.123.235:53182
69.139.176.16:5091
174.247.113.60:16625
82.34.204.163:29554
38.149.44.210:27362
75.150.190.231:49453
233.28.178.189:51109
156.55.175.218:18225
226.245.201.147:56691
30.208.231.241:3060
242.154.104.135:0
62.228.78.206:44566
88.203.47.199:48997
23.115.133.62:57748
217.190.219.41:29447
236.129.127.216:10887
179.121.12.220:50554
156.164.32.211:21954
239.86.43.169:5793
139.44.244.27:5564
193.133.234.0:0
Unpacked files
SH256 hash:
769cbbd802e51201b8664078043d34588593f237d7139fd67850adf2ed6be0c6
MD5 hash:
2ad3f0ad6b421e676420c38658e0f2ec
SHA1 hash:
c73746053b23c98de7388d0a938fb569ebec200c
SH256 hash:
5ef27986b7ef4f221c7c7ed2bb1cc50eeb304c2f41e4c5c6b3288f752dc6591e
MD5 hash:
0f5f61804e97020ee67ada4122431d8f
SHA1 hash:
e94c460d44f1be5b4b05af538d1e2bc8c66f9dde
Detections:
Qakbot win_qakbot_auto
SH256 hash:
3f3efd6c40d562ef37c921c7aa9e710c743638acc2d16580e1a560060142fc68
MD5 hash:
2135477510d718180c3261dc1dbfa403
SHA1 hash:
4770851128972bb1955a36d13e97d444e988a861
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:QakBot
Author:kevoreilly
Description:QakBot Payload
Rule name:unpacked_qbot
Description:Detects unpacked or memory-dumped QBot samples
Rule name:win_qakbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.qakbot.
Rule name:win_qakbot_malped
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.qakbot.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments