MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 630172a8554497585e6fd7ebb266e040d29f49b09f728ef00d33b178a6604120. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 630172a8554497585e6fd7ebb266e040d29f49b09f728ef00d33b178a6604120
SHA3-384 hash: a1af353e1ef669fbcf41c5cc9b3da70d7587d3a78156f90bbf787e8cc4b78fa6658a1ac7df5947851edb52d44c5b565a
SHA1 hash: bd03d129975bcc51f79769c305e1acda8a1387a1
MD5 hash: 1b7f60cd44c6a084aa5144a1a119a5e2
humanhash: iowa-lima-coffee-friend
File name:Lknh.png
Download: download sample
Signature Quakbot
File size:875'863 bytes
First seen:2022-04-06 16:10:09 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 49475e98a322cf931bef4088d7fe32a6 (4 x Quakbot)
ssdeep 12288:w4Z52dj02g1PG9kBQLCygwjHItQOhcrga114QFdy4unYkAi5QVhP3v82xidH7FKb:Zrj9RTyEtQOhygaFdyHYkANb82xilFu
Threatray 10 similar samples on MalwareBazaar
TLSH T15615AE72A2D194FFC1723678AC2A61909C35BE902D24CC8CB7D91F5F4E3A792272525F
File icon (PE):PE icon
dhash icon 399998ecd4d46c0e (572 x Quakbot, 137 x ArkeiStealer, 82 x GCleaner)
Reporter proxylife
Tags:AA dll Qakbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
273
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe greyware keylogger overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CryptOne Qbot
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to detect sleep reduction / modifications
Found malware configuration
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sigma detected: Schedule system process
Sigma detected: Suspicious Call by Ordinal
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected CryptOne packer
Yara detected Qbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 604153 Sample: Lknh.png Startdate: 06/04/2022 Architecture: WINDOWS Score: 100 56 Found malware configuration 2->56 58 Yara detected CryptOne packer 2->58 60 Yara detected Qbot 2->60 62 5 other signatures 2->62 9 loaddll32.exe 1 2->9         started        12 regsvr32.exe 2->12         started        14 regsvr32.exe 2->14         started        process3 signatures4 72 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 9->72 74 Injects code into the Windows Explorer (explorer.exe) 9->74 76 Writes to foreign memory regions 9->76 78 3 other signatures 9->78 16 cmd.exe 1 9->16         started        18 explorer.exe 8 1 9->18         started        21 regsvr32.exe 12->21         started        24 regsvr32.exe 14->24         started        process5 file6 26 rundll32.exe 16->26         started        50 C:\Users\user\Desktop\Lknh.dll, PE32 18->50 dropped 29 schtasks.exe 1 18->29         started        64 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 21->64 66 Injects code into the Windows Explorer (explorer.exe) 21->66 68 Writes to foreign memory regions 21->68 70 3 other signatures 21->70 31 explorer.exe 8 2 21->31         started        signatures7 process8 signatures9 80 Injects code into the Windows Explorer (explorer.exe) 26->80 82 Writes to foreign memory regions 26->82 84 Allocates memory in foreign processes 26->84 88 2 other signatures 26->88 33 explorer.exe 26->33         started        36 WerFault.exe 23 9 26->36         started        38 conhost.exe 29->38         started        86 Uses cmd line tools excessively to alter registry or file data 31->86 40 reg.exe 1 1 31->40         started        42 reg.exe 1 1 31->42         started        44 conhost.exe 31->44         started        process10 signatures11 52 Uses cmd line tools excessively to alter registry or file data 33->52 54 Uses schtasks.exe or at.exe to add and modify task schedules 33->54 46 conhost.exe 40->46         started        48 conhost.exe 42->48         started        process12
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2022-04-06 16:11:09 UTC
File Type:
PE (Dll)
Extracted files:
38
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:aa campaign:1649247892 banker stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Loads dropped DLL
Qakbot/Qbot
Malware Config
C2 Extraction:
181.208.248.227:443
176.205.119.81:2078
92.177.45.46:2078
70.46.220.114:443
39.49.81.128:995
91.177.173.10:995
31.56.252.29:32103
117.248.109.38:21
197.87.144.193:443
172.114.160.81:995
102.159.243.153:443
144.136.35.102:2222
45.241.214.192:995
143.0.34.185:443
67.209.195.198:443
24.178.196.158:2222
217.128.122.65:2222
89.211.187.3:2222
41.230.62.211:993
179.158.105.44:443
187.102.135.142:2222
174.69.215.101:443
209.197.176.40:995
120.150.218.241:995
63.143.92.99:995
82.152.39.39:443
42.235.146.7:2222
92.154.9.41:2222
31.48.166.122:2078
41.107.251.69:443
75.113.214.234:2222
86.98.208.214:2222
1.161.121.58:443
190.73.3.148:2222
76.69.155.202:2222
196.203.37.215:80
83.110.157.57:2222
85.246.82.244:443
96.29.208.97:443
74.15.2.252:2222
76.70.9.169:2222
108.60.213.141:443
75.99.168.194:443
86.195.158.178:2222
72.76.94.99:443
71.74.12.34:443
191.17.223.93:32101
103.230.180.119:443
103.139.243.207:990
38.70.253.226:2222
96.21.251.127:2222
140.82.49.12:443
5.95.58.211:2087
31.215.185.114:2222
182.191.92.203:995
176.67.56.94:443
39.44.144.159:995
197.162.118.178:993
37.210.238.79:61202
203.122.46.130:443
148.64.96.100:443
47.180.172.159:443
47.23.89.62:995
181.118.183.98:443
76.169.147.192:32103
172.115.177.204:2222
46.107.48.202:443
105.226.83.196:995
93.48.80.198:995
103.107.113.120:443
24.43.99.75:443
80.11.74.81:2222
102.140.71.72:443
41.38.167.179:995
207.170.238.231:443
66.98.42.102:443
83.110.85.209:443
75.99.168.194:61201
45.9.20.200:443
173.174.216.62:443
47.180.172.159:50010
83.110.75.97:2222
47.23.89.62:993
103.116.178.85:995
113.11.89.165:995
187.207.48.194:61202
140.82.63.183:443
144.202.2.175:995
149.28.238.199:995
45.76.167.26:443
45.63.1.12:443
144.202.2.175:443
140.82.63.183:995
144.202.3.39:995
149.28.238.199:443
45.63.1.12:995
144.202.3.39:443
45.76.167.26:995
32.221.224.140:995
31.35.28.29:443
176.88.238.122:995
71.13.93.154:2222
81.215.196.174:443
78.161.215.162:443
83.110.85.209:995
202.134.152.2:2222
103.88.226.30:443
109.228.220.196:443
41.228.22.180:443
2.50.137.197:443
1.161.121.58:995
120.61.1.185:443
175.145.235.37:443
86.98.156.250:993
75.188.35.168:443
39.52.34.138:995
94.36.195.250:2222
58.105.167.36:50000
41.84.232.168:995
208.107.221.224:443
121.74.178.16:995
119.158.126.69:995
173.21.10.71:2222
76.25.142.196:443
201.124.1.172:443
191.99.191.28:443
73.151.236.31:443
181.62.0.59:443
72.12.115.90:22
201.145.189.252:443
5.32.41.45:443
37.34.253.233:443
143.0.219.6:995
40.134.246.185:995
72.252.201.34:995
102.182.232.3:995
70.51.134.168:2222
189.178.44.144:22
190.252.242.69:443
24.55.67.176:443
201.211.64.196:2222
90.120.65.153:2078
45.46.53.140:2222
70.57.207.83:443
109.12.111.14:443
98.22.246.169:443
47.156.191.217:443
72.252.201.34:990
31.215.185.114:1194
191.112.29.181:443
Unpacked files
SH256 hash:
8639c9379fdda840e88076ba014fcf08ed7a6f937fafc729b612b1ce658590d2
MD5 hash:
df0fded6dcdf0d821c07981671923152
SHA1 hash:
ab74458a1292ced60cacf255cdcac003b22e4582
SH256 hash:
0ab2c0b9662c209a0dcd34d7a150b14501ded9b73d946e175e56869753c13dd2
MD5 hash:
f61b64d18f3fc1e8337abf44dd0544da
SHA1 hash:
70ff03a3289c614347fb8c0bdae0dac9bfcb184b
SH256 hash:
630172a8554497585e6fd7ebb266e040d29f49b09f728ef00d33b178a6604120
MD5 hash:
1b7f60cd44c6a084aa5144a1a119a5e2
SHA1 hash:
bd03d129975bcc51f79769c305e1acda8a1387a1
Malware family:
CryptOne
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments