MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4d71f075bea3a0676161c066ad62175bdf28655c7ef685192859b278e93c6a06. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 4d71f075bea3a0676161c066ad62175bdf28655c7ef685192859b278e93c6a06
SHA3-384 hash: bfce224ec9b1ed6f81dad77191ae0f73dafce9240e9df5c1ca77cccc95312ff975b00f5d7347e0cd8261224df133afb2
SHA1 hash: 2f05196bd17b962f87bd26e0534044ed7163b6d2
MD5 hash: c7580a6351ed5eef53c207758f0d8463
humanhash: india-charlie-ten-alanine
File name:4d71f075bea3a0676161c066ad62175bdf28655c7ef685192859b278e93c6a06
Download: download sample
Signature QuakBot
File size:1'094'096 bytes
First seen:2020-11-15 09:55:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b8c436887f0ff05ef82a9442bb6ba7ca (3 x QuakBot)
ssdeep 12288:PqflDDoYel20NNHCizXv+Omjt7Wq1X6EQ2Xbhv7:P00k0NNHCgCt7nNbR7
Threatray 1'451 similar samples on MalwareBazaar
TLSH DC35011BE2E35E9BD893447D59E284B98031EFADD31BE4732A48F5DA31F26C4822E505
Reporter JAMESWT_WT
Tags:Orangetree B.V. Qakbot Quakbot signed

Code Signing Certificate

Organisation:Orangetree B.V.
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Nov 4 00:00:00 2020 GMT
Valid to:Nov 4 23:59:59 2021 GMT
Serial number: 7E0CCDA0EF37ACEF6C2EBE4538627E5C
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: D032358A31097655857E002CE8EC0FA10DDA8E7569D97955CED1DACC7D79926A
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
189
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.QBot
Status:
Malicious
First seen:
2020-11-13 14:23:12 UTC
File Type:
PE (Exe)
AV detection:
28 of 29 (96.55%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
4d71f075bea3a0676161c066ad62175bdf28655c7ef685192859b278e93c6a06
MD5 hash:
c7580a6351ed5eef53c207758f0d8463
SHA1 hash:
2f05196bd17b962f87bd26e0534044ed7163b6d2
SH256 hash:
601d3bfa5b79fbeb10915d85f77eb8571bf6ec931e9c68bb0d5e8093901e9171
MD5 hash:
292c32869b2d38ebd62f3b2d24ab5863
SHA1 hash:
06176e73f6ed54f615a0d09ea1e0c555da91488c
Detections:
win_qakbot_g0 win_qakbot_auto
SH256 hash:
4692f0a62f714d0acb7a58b0f52e96844d75e93980e87a3c959eb6773d734e0d
MD5 hash:
34b6b8e9f422bd64ddac18fb466cbdfa
SHA1 hash:
fb0f92fcab48eb274191d734fc557158c0ebc8df
Detections:
win_qakbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments