MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 540033fa84f80fb1e31c73139d2a043790a980191c5c5e4416bcfa51d4394a4f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Quakbot
Vendor detections: 7
| SHA256 hash: | 540033fa84f80fb1e31c73139d2a043790a980191c5c5e4416bcfa51d4394a4f |
|---|---|
| SHA3-384 hash: | de9ce765308ccf09d51894e5ca0d2f01fd14d00307c73de2211ae0c5f913f8804a5e766bdac76cbd1a1fef3a7a60e850 |
| SHA1 hash: | cbac0edfa53ec9978467a6b0a63f726132acefc2 |
| MD5 hash: | f8ae9fb195d267c50b8884bbd1459a10 |
| humanhash: | hotel-bulldog-wyoming-utah |
| File name: | spillage.dat |
| Download: | download sample |
| Signature | Quakbot |
| File size: | 432'640 bytes |
| First seen: | 2022-10-27 19:47:05 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | fae84ade86333bc16f134b64e603e945 (8 x Quakbot) |
| ssdeep | 12288:eqdD/sblafl4M/8toGXJZ6diNjbo8Ywr6t57AKC:eqdclafl4eGXuiNs8Ye6c |
| Threatray | 1'607 similar samples on MalwareBazaar |
| TLSH | T1F594E040F4A3DFF2D1BD183800B6A3631B2956260B26C9FB53848B267E747D15B3A776 |
| TrID | 32.2% (.EXE) Win64 Executable (generic) (10523/12/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4505/5/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | dll Qakbot Quakbot |
Intelligence
File Origin
# of uploads :
1
# of downloads :
258
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Suspicious
Maliciousness:
Behaviour
Searching for the window
Сreating synchronization primitives
Launching a process
Searching for synchronization primitives
Modifying an executable file
Creating a window
Unauthorized injection to a system process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Threat name:
Win32.Trojan.KBot
Status:
Malicious
First seen:
2022-10-27 20:14:27 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
15 of 26 (57.69%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
qakbot
Similar samples:
+ 1'597 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
1/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
563be174a9a6d5aee2b6b4f58bcc62c597ff491ebce308fc832678e85bd6f9a7
MD5 hash:
45d15630e5c0c6995a95265697d0c244
SHA1 hash:
7ac21328c5ba62ef50956f1949ae1344bb25554e
Detections:
Qakbot
win_qakbot_auto
SH256 hash:
540033fa84f80fb1e31c73139d2a043790a980191c5c5e4416bcfa51d4394a4f
MD5 hash:
f8ae9fb195d267c50b8884bbd1459a10
SHA1 hash:
cbac0edfa53ec9978467a6b0a63f726132acefc2
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Distributed via e-mail link
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.