MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 57e28579e8cd60487ca71115bd4367ba45bee5a7e3ea78023bc817d4699c3c9f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 9


Intelligence 9 IOCs YARA 4 File information Comments

SHA256 hash: 57e28579e8cd60487ca71115bd4367ba45bee5a7e3ea78023bc817d4699c3c9f
SHA3-384 hash: 8a61cebea8b8f6a764affc2c60f0c71153a2fd0d573f7a7f0d5582cbe5e2f85f060b518f77e8f28caab06d14460da55d
SHA1 hash: ecb47e47e31247d8969ab48a629f2bc2e6cfecec
MD5 hash: 44255200f634646100d6e71e8f5ae7d7
humanhash: fillet-yankee-skylark-iowa
File name:_Vkc.dll
Download: download sample
Signature Quakbot
File size:410'879 bytes
First seen:2022-09-13 13:14:59 UTC
Last seen:2022-09-13 13:58:56 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash df144ca6f4d86bd687145d0f4cf05516 (4 x Quakbot)
ssdeep 12288:9zlWXAEum0intq9k7PPsVcELe8IrHpDzl/qlhgs:9zQXAEujEQu7Iu8IrHTylhg
TLSH T11394E090B8C94867C8B93D74416AF63769AD26333C16CD2B932027B43F712D2B627D5E
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter ffforward
Tags:BB dll Qakbot qbot Quakbot tr

Intelligence


File Origin
# of uploads :
2
# of downloads :
370
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Launching a process
Modifying an executable file
Searching for synchronization primitives
Creating a process with a hidden window
Sending a custom TCP request
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Infostealer.QBot
Status:
Malicious
First seen:
2022-09-13 13:15:08 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
12 of 25 (48.00%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:bb campaign:1663053540 banker stealer trojan
Behaviour
Creates scheduled task(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in System32 directory
Loads dropped DLL
Qakbot/Qbot
Malware Config
C2 Extraction:
194.49.79.231:443
193.3.19.37:443
99.232.140.205:2222
47.146.182.110:443
84.38.133.191:443
191.97.234.238:995
37.210.148.30:995
64.207.215.69:443
200.161.62.126:32101
88.245.103.132:2222
86.98.156.176:993
175.110.231.67:443
78.100.254.17:2222
191.84.204.214:995
123.240.131.1:443
197.94.210.133:443
196.92.172.24:8443
186.50.245.74:995
70.51.132.197:2222
100.1.5.250:995
179.111.111.88:32101
151.234.97.239:990
78.182.113.80:443
91.116.160.252:443
41.96.152.196:443
105.99.217.147:995
105.109.138.89:443
81.131.161.131:2078
41.97.64.224:443
134.35.11.110:443
102.188.100.131:995
41.248.89.135:443
81.214.220.237:443
113.170.216.154:443
187.205.222.100:443
95.136.41.50:443
190.158.58.236:443
105.98.130.85:443
190.44.40.48:995
105.197.192.21:995
181.127.138.30:443
167.60.82.242:995
196.112.34.71:443
88.251.38.53:443
68.224.229.42:443
37.37.206.87:995
37.76.197.124:443
188.157.6.170:443
109.158.159.179:993
68.50.190.55:443
181.111.20.201:443
31.166.116.171:443
84.238.253.171:443
197.49.50.44:443
169.159.95.135:2222
45.160.124.211:995
113.22.102.155:443
211.248.176.4:443
186.167.249.206:443
85.114.99.34:443
85.98.206.165:995
139.195.132.210:2222
182.213.208.5:443
201.177.163.176:443
45.183.234.180:443
98.180.234.228:443
184.82.110.50:995
179.24.245.193:995
94.99.110.157:995
181.56.125.32:443
119.42.124.18:443
181.231.229.133:443
2.89.78.130:993
70.81.121.237:2222
181.81.116.144:443
197.11.128.156:443
41.142.132.190:443
105.111.60.60:995
154.238.151.197:995
156.219.49.22:995
154.181.136.133:995
179.223.89.154:995
102.101.231.141:443
220.116.250.45:443
138.0.114.166:443
62.114.193.186:995
85.98.46.114:443
88.244.84.195:443
184.99.123.118:443
186.120.58.88:443
46.186.216.41:32100
156.213.107.29:995
27.73.215.46:32102
68.151.196.147:995
181.59.3.118:443
68.129.232.158:443
45.241.140.181:995
212.156.51.194:443
87.75.195.211:443
1.10.253.207:443
87.220.229.164:2222
109.200.165.82:443
41.105.197.244:443
190.59.247.136:995
219.69.103.199:443
61.105.45.244:443
105.105.104.0:443
169.1.47.111:443
210.195.18.76:2222
125.26.54.57:995
88.246.170.2:443
95.10.13.82:443
171.248.157.128:995
118.68.220.199:443
139.195.63.45:2222
118.216.99.232:443
181.80.133.202:443
102.40.236.32:995
46.116.229.16:443
61.70.29.53:443
179.108.32.195:443
171.238.230.59:443
81.56.22.251:995
31.32.180.179:443
197.204.209.38:443
186.64.87.202:443
85.139.203.42:32101
120.150.218.241:995
173.189.167.21:995
24.139.72.117:443
104.34.212.7:32103
47.23.89.61:995
24.55.67.176:443
172.115.177.204:2222
217.165.77.134:995
24.178.196.158:2222
67.209.195.198:443
111.125.245.116:995
39.49.67.4:995
78.101.202.75:50010
37.34.253.233:443
217.165.77.134:443
46.107.48.202:443
70.46.220.114:443
63.143.92.99:995
93.48.80.198:995
179.158.103.236:443
47.180.172.159:443
47.23.89.61:993
Unpacked files
SH256 hash:
57e28579e8cd60487ca71115bd4367ba45bee5a7e3ea78023bc817d4699c3c9f
MD5 hash:
44255200f634646100d6e71e8f5ae7d7
SHA1 hash:
ecb47e47e31247d8969ab48a629f2bc2e6cfecec
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:QakBot
Author:kevoreilly
Description:QakBot Payload
Rule name:unpacked_qbot
Description:Detects unpacked or memory-dumped QBot samples
Rule name:win_qakbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.qakbot.
Rule name:win_qakbot_malped
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.qakbot.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Quakbot

DLL dll 57e28579e8cd60487ca71115bd4367ba45bee5a7e3ea78023bc817d4699c3c9f

(this sample)

  
Delivery method
Distributed via web download

Comments