MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4acf40ba4dc505e027323e56fc1ffee7fa9909abe5186e2a8acf646069ecf290. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 4acf40ba4dc505e027323e56fc1ffee7fa9909abe5186e2a8acf646069ecf290
SHA3-384 hash: 2aa9309e0b11fb6910ac4a9907cb58a0bc6195a6f11030ffed5513a9b87973757bdac5557fbdd1ad3357825dbddeb912
SHA1 hash: 91a7c35c6fdf8f684b21815ff29a2745c16d901c
MD5 hash: 1a9d42957bacf586d050739f4b1fa6f7
humanhash: batman-may-leopard-oranges
File name:itsfresh.dat
Download: download sample
Signature Quakbot
File size:256'668 bytes
First seen:2023-05-04 10:13:47 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash aa6732aad80627bf3fc823b2fbac9d4e (2 x Quakbot)
ssdeep 6144:SsUG4yxNqItF5W9XncaWDAdjaTNc8Qs3Az0tDCFHyHQT3JkYVU0ZIf2Bqp:Ssd4VItpkdjSe0AFHyw+0ZHq
TLSH T16A44CE11B944E130E9E212F3DABA391A6F6FD660035A62D373605EA51F885D37E3E343
TrID 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.7% (.EXE) Win64 Executable (generic) (10523/12/4)
7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter pr0xylife
Tags:1683182516 BB26 dll Qakbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
289
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2023-05-04 10:14:07 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Unpacked files
SH256 hash:
7fdeb20b750ece1b386cfa5bab14f846be0266bd88b23f66f6e5b58eca98096e
MD5 hash:
93db159a6c114bde58bb53a4f6d93205
SHA1 hash:
73e6cb791df53e2b2befda04860c213e63072105
Detections:
Qakbot win_qakbot_auto
SH256 hash:
4acf40ba4dc505e027323e56fc1ffee7fa9909abe5186e2a8acf646069ecf290
MD5 hash:
1a9d42957bacf586d050739f4b1fa6f7
SHA1 hash:
91a7c35c6fdf8f684b21815ff29a2745c16d901c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments