MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 670561effe16712f925e3ef2c2a807020c8d4a227d520016ef03087502f036ad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
QuakBot
Vendor detections: 9
| SHA256 hash: | 670561effe16712f925e3ef2c2a807020c8d4a227d520016ef03087502f036ad |
|---|---|
| SHA3-384 hash: | b6eb3875455fdccaa278fa97231e9f995d2d311b7c33b2cd66da5201b4f8f41250d664b1018a89052bc66a06ba80d105 |
| SHA1 hash: | ee433e863f4fcfae4b4a724770f449c6d84557c8 |
| MD5 hash: | 6dd67eddbf99672e0b741907f39c3285 |
| humanhash: | harry-kansas-spaghetti-wisconsin |
| File name: | 670561effe16712f925e3ef2c2a807020c8d4a227d520016ef03087502f036ad |
| Download: | download sample |
| Signature | QuakBot |
| File size: | 258'576 bytes |
| First seen: | 2020-11-13 15:39:56 UTC |
| Last seen: | 2024-07-24 15:15:47 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 303f89b8f429d52fa9a67ddad2dbfa52 (160 x QuakBot) |
| ssdeep | 6144:6dtJ9rtpMBa72/oytPqb+z0qLivK7WzR7mM6B:6d1rMBgkoytF0qLGK70Ry |
| Threatray | 1'306 similar samples on MalwareBazaar |
| TLSH | 5444E0C1A7E80184F6EBA2B74477C3103A127C9DA93D9B7F19F5B1EC2934A219D2871D |
| Reporter | |
| Tags: | Quakbot |
Intelligence
File Origin
# of uploads :
2
# of downloads :
62
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-11-13 15:43:52 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 1'296 additional samples on MalwareBazaar
Result
Malware family:
qakbot
Score:
10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
670561effe16712f925e3ef2c2a807020c8d4a227d520016ef03087502f036ad
MD5 hash:
6dd67eddbf99672e0b741907f39c3285
SHA1 hash:
ee433e863f4fcfae4b4a724770f449c6d84557c8
SH256 hash:
ba89eeda5a611d5c1367db832da4bad0ba5b034ebd5f9ee886faa336fc346dfe
MD5 hash:
6ba63ed754124d794493cf4b0d80a4ac
SHA1 hash:
c1339862f2c45c44ff26f1ee6090791c7051291d
Detections:
win_qakbot_g0
win_qakbot_auto
SH256 hash:
99ea9ddde1f4179037aaf948b0920f6ae80e1e4c738053ebde9be3283c9430de
MD5 hash:
1401d43f02aa09c746340ef704deb891
SHA1 hash:
f60460fbd3358a8a95b39f03919afa389a796d85
Detections:
win_qakbot_auto
Parent samples :
2450297d7ef66a5573ab6450aa5578f7e4c293b809f02cdac7126ad55f0e8549
768cce865f75b519643028d50bcbd2927bd64f8b1fe112faaa8a8f4d39408c2d
03f3d80c2d66e09f1ac8196deed5cec1fe1a9f3501ba3fb48ba2d2820b7f97f2
1b8fe9bfaa3f6ab8be12321c2198bb3ca39c6da867dbb503f5a1a3433d099d05
670561effe16712f925e3ef2c2a807020c8d4a227d520016ef03087502f036ad
4691eecceb853d64d7f30e0e901a9df4f385eaca43c5c441dd7100298fbdca71
674c204e1c5d02db45a5d9b434042b17829fadfb5a91a97dee442fd00d56c34c
768cce865f75b519643028d50bcbd2927bd64f8b1fe112faaa8a8f4d39408c2d
03f3d80c2d66e09f1ac8196deed5cec1fe1a9f3501ba3fb48ba2d2820b7f97f2
1b8fe9bfaa3f6ab8be12321c2198bb3ca39c6da867dbb503f5a1a3433d099d05
670561effe16712f925e3ef2c2a807020c8d4a227d520016ef03087502f036ad
4691eecceb853d64d7f30e0e901a9df4f385eaca43c5c441dd7100298fbdca71
674c204e1c5d02db45a5d9b434042b17829fadfb5a91a97dee442fd00d56c34c
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
qbot
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.