MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 661e0c31acf912171fbc97e3943fb618ca1cc689dbb17be209c9de8cb4809c37. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 661e0c31acf912171fbc97e3943fb618ca1cc689dbb17be209c9de8cb4809c37
SHA3-384 hash: edf0d510a6ac7bf90996008ea75c67909744e657a94527c48ae09215a704d6bddc759805d199334d7e740dd0558006d7
SHA1 hash: 784c36314272ac2a7c252421279ec1ea59f61900
MD5 hash: 88198cab3c51396900f3cf2f4022c703
humanhash: beryllium-spring-jig-august
File name:CTT-MAIO.442-CN.25.msi
Download: download sample
Signature Quakbot
File size:3'346'944 bytes
First seen:2023-05-17 11:45:17 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 24576:4UZLe5EY5Al0mAYC0o0Iy4171FaY3w1NKTyHDEIhUuGK5i6IOK1dMYqW9sxv:z4EY5AGmea
Threatray 263 similar samples on MalwareBazaar
TLSH T1A3F5528522C4BC5083579EBFBA2BB5E5E47A0CDC2341144AE229F4A1F4F9B06FDD1A35
TrID 80.0% (.MSI) Microsoft Windows Installer (454500/1/170)
10.7% (.MST) Windows SDK Setup Transform script (61000/1/5)
7.8% (.MSP) Windows Installer Patch (44509/10/5)
1.4% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter FXOLabs
Tags:msi Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
95
Origin country :
BR BR
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm dde packed phishing shell32.dll
Result
Threat name:
VMdetect
Detection:
malicious
Classification:
rans.troj.evad
Score:
84 / 100
Signature
.NET source code contains potential unpacker
Connects to a pastebin service (likely for C&C)
Contain functionality to detect virtual machines
Drops PE files to the user root directory
Snort IDS alert for network traffic
Uses shutdown.exe to shutdown or reboot the system
Yara detected AntiVM
Yara detected VMdetect
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 868189 Sample: CTT-MAIO.442-CN.25.msi Startdate: 17/05/2023 Architecture: WINDOWS Score: 84 59 Snort IDS alert for network traffic 2->59 61 Yara detected VMdetect 2->61 63 Yara detected AntiVM 2->63 65 2 other signatures 2->65 8 msiexec.exe 9 30 2->8         started        11 cyovoc.exe 17 3 2->11         started        15 msiexec.exe 2 2->15         started        process3 dnsIp4 45 C:\Windows\Installer\4fd9f4.msi, Composite 8->45 dropped 47 C:\Windows\Installer\MSI36FC.tmp, PE32 8->47 dropped 49 C:\Windows\Installer\MSI33CE.tmp, PE32 8->49 dropped 51 2 other files (none is malicious) 8->51 dropped 17 msiexec.exe 4 9 8->17         started        55 aerx2020ceun23.assc 11->55 57 pastebin.com 104.20.68.143, 443, 49693 CLOUDFLARENETUS United States 11->57 71 Contain functionality to detect virtual machines 11->71 file5 signatures6 process7 dnsIp8 53 www.google.com 172.217.16.164, 49692, 80 GOOGLEUS United States 17->53 37 C:\Users\user\pinga.exe, PE32 17->37 dropped 39 C:\Users\user\cyovoc.exe (copy), PE32 17->39 dropped 41 C:\Users\user\cinza.exe, PE32 17->41 dropped 43 2 other malicious files 17->43 dropped 67 Drops PE files to the user root directory 17->67 22 cmd.exe 1 17->22         started        25 cmd.exe 1 17->25         started        27 lc1DBF.tmp 17->27         started        file9 signatures10 process11 signatures12 69 Uses shutdown.exe to shutdown or reboot the system 22->69 29 conhost.exe 22->29         started        31 shutdown.exe 1 22->31         started        33 conhost.exe 25->33         started        35 shutdown.exe 1 25->35         started        process13
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies data under HKEY_USERS
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Enumerates connected drives
Drops startup file
Executes dropped EXE
Loads dropped DLL
Blocklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_msi_file
Author:Johnk3r
Description:Detects common strings, DLL and API in Banker_BR

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail link

Comments