MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5c6f9bba14dfb1e7b6a8dd697ae6ba69181d5af7cccf6dd40b89516d5ea483c3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 5c6f9bba14dfb1e7b6a8dd697ae6ba69181d5af7cccf6dd40b89516d5ea483c3
SHA3-384 hash: 8ead606346d0f4e4a3071be0da9994041251e48e4943e1ebece5a8edac343d643b56018a071d7edb03558e0f44d664df
SHA1 hash: edb4c891aeee9bafce87edae7bf6192d390ee0ed
MD5 hash: 0b95ec4cb578eb2a6f6b749628883ada
humanhash: mobile-uncle-batman-alpha
File name:0b95ec4cb578eb2a6f6b749628883ada.exe
Download: download sample
Signature Quakbot
File size:1'094'120 bytes
First seen:2020-11-12 09:20:05 UTC
Last seen:2024-07-24 14:50:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ba5c263c6125faae2c597950f7826711 (27 x Quakbot)
ssdeep 12288:sqflDDoYeF20NNHCW8k45hox9l7pUHcX6EQ2Xbh7:s00E0NNHCWZmO7aHCNb5
Threatray 1'093 similar samples on MalwareBazaar
TLSH 2D35011BE1E35BCBE483417C69E280BA9532EF8DDB1BD47B2A18F1D871B63C5851E604
Reporter abuse_ch
Tags:exe Quakbot

Intelligence


File Origin
# of uploads :
2
# of downloads :
111
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Ransomware.WannaCry
Status:
Malicious
First seen:
2020-11-12 09:21:05 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
5c6f9bba14dfb1e7b6a8dd697ae6ba69181d5af7cccf6dd40b89516d5ea483c3
MD5 hash:
0b95ec4cb578eb2a6f6b749628883ada
SHA1 hash:
edb4c891aeee9bafce87edae7bf6192d390ee0ed
SH256 hash:
941895d7884737991f56f8c08e2f4cb3e9b5fe392fc4d605a38c094fd6e55076
MD5 hash:
92012015d9188eddfec78788266c0a1b
SHA1 hash:
b41c96a019524e442ee689868914b0b570367288
Detections:
win_qakbot_g0 win_qakbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Quakbot

Executable exe 5c6f9bba14dfb1e7b6a8dd697ae6ba69181d5af7cccf6dd40b89516d5ea483c3

(this sample)

  
Delivery method
Distributed via web download

Comments