MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 60d4424bf0e6f70e66571a1d038780b9d8e91cb03e58dbec4de002619c1c12d8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Quakbot
Vendor detections: 8
| SHA256 hash: | 60d4424bf0e6f70e66571a1d038780b9d8e91cb03e58dbec4de002619c1c12d8 |
|---|---|
| SHA3-384 hash: | ca11cda3cd73f64acdafd5c2b4a25d7f473a4b136815259735ea85da384c2d0c7adca3b3362eb244d61fc647e9fc9350 |
| SHA1 hash: | 69447146297ea38b96cdd71db7dd65f6ef4d2bea |
| MD5 hash: | aa56b75af290ec0087f00ca0e5320785 |
| humanhash: | gee-minnesota-social-mars |
| File name: | 44651,6679619213.dat |
| Download: | download sample |
| Signature | Quakbot |
| File size: | 1'317'888 bytes |
| First seen: | 2022-04-04 15:31:36 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 5266d8a9f57987d2399bb2ea15bfb7ec (2 x Quakbot) |
| ssdeep | 24576:gSF1IH9yO/O9vTb4GTrRZsjH5ROrAgeQJrPioBkmmwMSE89dgTcm0r+wgYYJm2VI: |
| Threatray | 400 similar samples on MalwareBazaar |
| TLSH | T1CA55AEBC75047DD6E66F577BDE96ACDD13B626328AC7A4CC80647BC30963362EE02805 |
| Reporter | |
| Tags: | dll obama172 Quakbot |
Intelligence
File Origin
# of uploads :
1
# of downloads :
220
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Сreating synchronization primitives
Launching a process
Searching for synchronization primitives
Creating a window
Sending a custom TCP request
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
Qbot
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Allocates memory in foreign processes
Found malware configuration
Injects code into the Windows Explorer (explorer.exe)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sigma detected: Suspicious Call by Ordinal
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Qbot
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.BotX
Status:
Malicious
First seen:
2022-04-04 15:32:09 UTC
File Type:
PE (Dll)
AV detection:
21 of 26 (80.77%)
Threat level:
5/5
Verdict:
malicious
Label(s):
qakbot
Similar samples:
+ 390 additional samples on MalwareBazaar
Result
Malware family:
qakbot
Score:
10/10
Tags:
family:qakbot botnet:obama172 campaign:1649058142 banker stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Qakbot/Qbot
Malware Config
C2 Extraction:
45.9.20.200:443
173.174.216.62:443
187.207.7.231:61202
207.170.238.231:443
47.180.172.159:50010
70.57.207.83:443
83.110.75.97:2222
58.105.167.36:50000
47.23.89.62:993
72.76.94.99:443
83.110.157.57:2222
45.241.145.252:995
82.84.66.211:2222
75.99.168.194:61201
144.202.3.39:443
45.63.1.12:995
149.28.238.199:995
140.82.63.183:443
45.63.1.12:443
144.202.3.39:995
144.202.2.175:443
140.82.63.183:995
144.202.2.175:995
45.76.167.26:995
45.76.167.26:443
149.28.238.199:443
31.35.28.29:443
32.221.224.140:995
71.13.93.154:2222
102.65.38.90:443
83.110.85.209:995
70.46.220.114:443
91.177.173.10:995
81.60.218.17:995
197.162.118.178:993
24.178.196.158:2222
37.152.80.105:443
172.114.160.81:995
103.107.113.120:443
176.88.238.122:995
67.209.195.198:443
86.220.98.71:2222
80.11.74.81:2222
92.96.182.192:2222
5.95.58.211:2087
24.152.219.253:995
217.128.122.65:2222
78.100.227.177:2222
39.41.173.204:995
92.96.182.192:1194
174.69.215.101:443
93.48.80.198:995
103.87.95.133:2222
113.11.89.170:995
120.150.218.241:995
2.50.137.197:443
88.235.143.36:443
78.188.76.167:443
76.70.9.169:2222
75.113.214.234:2222
86.98.208.214:2222
173.21.10.71:2222
190.73.3.148:2222
76.69.155.202:2222
103.88.226.30:443
37.186.54.166:995
92.177.45.46:2078
180.183.128.80:2222
39.49.84.44:995
39.44.144.159:995
74.15.2.252:2222
5.32.41.45:443
108.60.213.141:443
75.99.168.194:443
202.134.152.2:2222
176.205.119.81:2078
2.50.22.45:443
31.215.69.127:443
96.21.251.127:2222
96.29.208.97:443
117.248.109.38:21
140.82.49.12:443
176.67.56.94:443
78.101.150.251:61202
203.122.46.130:443
148.64.96.100:443
47.180.172.159:443
47.23.89.62:995
66.98.42.102:443
83.110.85.209:443
76.169.147.192:32103
46.107.48.202:443
24.43.99.75:443
121.74.182.236:995
86.98.157.14:993
39.52.48.91:995
41.228.22.180:443
84.241.8.23:32103
71.74.12.34:443
103.230.180.119:443
102.140.70.17:443
182.191.92.203:995
101.255.82.166:443
45.46.53.140:2222
208.107.221.224:443
73.151.236.31:443
143.0.34.185:443
41.38.167.179:995
109.12.111.14:443
144.136.35.102:2222
37.34.253.233:443
70.51.134.168:2222
187.250.114.15:443
41.84.246.143:995
105.99.164.122:443
102.182.232.3:995
120.61.1.252:443
196.203.37.215:80
42.235.149.83:2222
90.120.65.153:2078
209.197.176.40:995
140.0.161.213:2222
172.115.177.204:2222
96.37.113.36:993
72.12.115.90:22
85.246.82.244:443
201.172.31.135:2222
181.62.0.59:443
179.158.105.44:443
191.112.12.240:443
191.251.191.31:443
109.228.220.196:443
161.142.56.8:443
201.211.64.196:2222
106.51.48.170:50001
39.57.119.44:995
102.156.205.117:443
89.137.52.44:443
114.79.148.170:443
105.226.83.196:995
75.188.35.168:443
112.199.148.55:995
201.145.189.252:443
187.213.21.78:22
187.102.135.142:2222
40.134.246.185:995
46.103.169.248:995
100.1.108.246:443
63.143.92.99:995
72.252.201.34:995
173.174.216.62:443
187.207.7.231:61202
207.170.238.231:443
47.180.172.159:50010
70.57.207.83:443
83.110.75.97:2222
58.105.167.36:50000
47.23.89.62:993
72.76.94.99:443
83.110.157.57:2222
45.241.145.252:995
82.84.66.211:2222
75.99.168.194:61201
144.202.3.39:443
45.63.1.12:995
149.28.238.199:995
140.82.63.183:443
45.63.1.12:443
144.202.3.39:995
144.202.2.175:443
140.82.63.183:995
144.202.2.175:995
45.76.167.26:995
45.76.167.26:443
149.28.238.199:443
31.35.28.29:443
32.221.224.140:995
71.13.93.154:2222
102.65.38.90:443
83.110.85.209:995
70.46.220.114:443
91.177.173.10:995
81.60.218.17:995
197.162.118.178:993
24.178.196.158:2222
37.152.80.105:443
172.114.160.81:995
103.107.113.120:443
176.88.238.122:995
67.209.195.198:443
86.220.98.71:2222
80.11.74.81:2222
92.96.182.192:2222
5.95.58.211:2087
24.152.219.253:995
217.128.122.65:2222
78.100.227.177:2222
39.41.173.204:995
92.96.182.192:1194
174.69.215.101:443
93.48.80.198:995
103.87.95.133:2222
113.11.89.170:995
120.150.218.241:995
2.50.137.197:443
88.235.143.36:443
78.188.76.167:443
76.70.9.169:2222
75.113.214.234:2222
86.98.208.214:2222
173.21.10.71:2222
190.73.3.148:2222
76.69.155.202:2222
103.88.226.30:443
37.186.54.166:995
92.177.45.46:2078
180.183.128.80:2222
39.49.84.44:995
39.44.144.159:995
74.15.2.252:2222
5.32.41.45:443
108.60.213.141:443
75.99.168.194:443
202.134.152.2:2222
176.205.119.81:2078
2.50.22.45:443
31.215.69.127:443
96.21.251.127:2222
96.29.208.97:443
117.248.109.38:21
140.82.49.12:443
176.67.56.94:443
78.101.150.251:61202
203.122.46.130:443
148.64.96.100:443
47.180.172.159:443
47.23.89.62:995
66.98.42.102:443
83.110.85.209:443
76.169.147.192:32103
46.107.48.202:443
24.43.99.75:443
121.74.182.236:995
86.98.157.14:993
39.52.48.91:995
41.228.22.180:443
84.241.8.23:32103
71.74.12.34:443
103.230.180.119:443
102.140.70.17:443
182.191.92.203:995
101.255.82.166:443
45.46.53.140:2222
208.107.221.224:443
73.151.236.31:443
143.0.34.185:443
41.38.167.179:995
109.12.111.14:443
144.136.35.102:2222
37.34.253.233:443
70.51.134.168:2222
187.250.114.15:443
41.84.246.143:995
105.99.164.122:443
102.182.232.3:995
120.61.1.252:443
196.203.37.215:80
42.235.149.83:2222
90.120.65.153:2078
209.197.176.40:995
140.0.161.213:2222
172.115.177.204:2222
96.37.113.36:993
72.12.115.90:22
85.246.82.244:443
201.172.31.135:2222
181.62.0.59:443
179.158.105.44:443
191.112.12.240:443
191.251.191.31:443
109.228.220.196:443
161.142.56.8:443
201.211.64.196:2222
106.51.48.170:50001
39.57.119.44:995
102.156.205.117:443
89.137.52.44:443
114.79.148.170:443
105.226.83.196:995
75.188.35.168:443
112.199.148.55:995
201.145.189.252:443
187.213.21.78:22
187.102.135.142:2222
40.134.246.185:995
46.103.169.248:995
100.1.108.246:443
63.143.92.99:995
72.252.201.34:995
Unpacked files
SH256 hash:
60d4424bf0e6f70e66571a1d038780b9d8e91cb03e58dbec4de002619c1c12d8
MD5 hash:
aa56b75af290ec0087f00ca0e5320785
SHA1 hash:
69447146297ea38b96cdd71db7dd65f6ef4d2bea
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.61
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.