MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 54143d46ffc8e27ed096659781ace6b86d64e60c6824a59104816f6b2eab0905. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 54143d46ffc8e27ed096659781ace6b86d64e60c6824a59104816f6b2eab0905
SHA3-384 hash: b9e3c7ac4e656dce3ae4c4470bcea4b9171e09427d50d50e7d4d98cb61987fd3b769d71a05d0971a5a17d6a20f4085be
SHA1 hash: 56366eeac75fb331535dc108406a961a0a52ef85
MD5 hash: 28fd9e8bf71e7d85027597d65947168f
humanhash: mockingbird-sink-nine-arizona
File name:28fd9e8bf71e7d85027597d65947168f.exe
Download: download sample
Signature Quakbot
File size:1'094'096 bytes
First seen:2020-11-15 08:25:41 UTC
Last seen:2020-11-15 09:40:40 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 71e265603dcecb9ce10a6b70d8736ffc (1 x Quakbot)
ssdeep 12288:1qflDDoYeAZMFTe9WyZlSyvEZX6EQ2XbhSn:1009FT5yPSyKNb4n
Threatray 1'448 similar samples on MalwareBazaar
TLSH E935011BF8570CE3CBDC5BBD14A8003BC3228B5FD6BB8AD17176904AE5691D4CAED909
Reporter abuse_ch
Tags:exe Quakbot

Intelligence


File Origin
# of uploads :
2
# of downloads :
190
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Zenpak
Status:
Malicious
First seen:
2020-11-15 08:26:06 UTC
AV detection:
31 of 48 (64.58%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
54143d46ffc8e27ed096659781ace6b86d64e60c6824a59104816f6b2eab0905
MD5 hash:
28fd9e8bf71e7d85027597d65947168f
SHA1 hash:
56366eeac75fb331535dc108406a961a0a52ef85
SH256 hash:
6d4bb0d47caa0778f56382b29e9528d83d3a27bc443624c37f77f28224cde08b
MD5 hash:
00f754d037bdb7206c08134bb1d23249
SHA1 hash:
0de75b319204c040a6c40bdf495d60028e6dbeef
Detections:
win_qakbot_g0 win_qakbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Quakbot

Executable exe 54143d46ffc8e27ed096659781ace6b86d64e60c6824a59104816f6b2eab0905

(this sample)

  
Delivery method
Distributed via web download

Comments