MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 57f86a03dcb2a9ebdd6d7184201cef6ba9d70f57aa524682857d4e7a27ec57ae. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 57f86a03dcb2a9ebdd6d7184201cef6ba9d70f57aa524682857d4e7a27ec57ae
SHA3-384 hash: 12aebecb932e13745d640a40e3ded9f8781a8a3e9f0ab08aa3266f73bf30f3d38f10c10bd3f246f624bb3e86fdac8779
SHA1 hash: 332c4de637e639b4818a03ba1ccb96e6d91a91bd
MD5 hash: 7e150e6c6ca9f318706651411f6afa37
humanhash: vegan-yellow-bravo-zebra
File name:index1.png
Download: download sample
Signature Quakbot
File size:656'056 bytes
First seen:2023-02-01 16:56:19 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash ba10210792cf2849761b9bb94eae1772 (8 x Quakbot)
ssdeep 12288:QljQRl3iZwl3JBrySD9CkkgC28DWl0RJK2LgAN4c1DJ92trs1tTr3+uZ:Q9WZiZCCMCkkBRDeSjcjc1DJ92ts1tXJ
Threatray 1'921 similar samples on MalwareBazaar
TLSH T1ECD48D11EA4398BACD5713714223F72F1739E7A0A43ACBCBD99C2C29DD139D1B64930A
TrID 29.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
18.5% (.EXE) Win64 Executable (generic) (10523/12/4)
11.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.7% (.FON) Windows Font (5545/9/1)
8.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter TheJayXYZ
Tags:dll Quakbot


Avatar
TheJayXYZ
file downloaded from a onenote, second payload

Intelligence


File Origin
# of uploads :
1
# of downloads :
196
Origin country :
CA CA
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug overlay packed qakbot spyeye
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
48 / 100
Signature
Sigma detected: Execute DLL with spoofed extension
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 796205 Sample: index1.png.dll Startdate: 01/02/2023 Architecture: WINDOWS Score: 48 27 Sigma detected: Execute DLL with spoofed extension 2->27 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 7 other processes 7->15 process5 17 rundll32.exe 9->17         started        19 WerFault.exe 24 9 11->19         started        21 WerFault.exe 2 9 13->21         started        23 WerFault.exe 9 15->23         started        25 WerFault.exe 9 15->25         started       
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2023-02-01 16:57:07 UTC
File Type:
PE (Dll)
AV detection:
10 of 26 (38.46%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
57f86a03dcb2a9ebdd6d7184201cef6ba9d70f57aa524682857d4e7a27ec57ae
MD5 hash:
7e150e6c6ca9f318706651411f6afa37
SHA1 hash:
332c4de637e639b4818a03ba1ccb96e6d91a91bd
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropping
Qakbot
  
Delivery method
Other

Comments