MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6778c59a29e25d722230163bea272ece58d2d3696fbce4347c20104e8fb735dc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: 6778c59a29e25d722230163bea272ece58d2d3696fbce4347c20104e8fb735dc
SHA3-384 hash: bc47964f1df50ea0fb28e475d10fbb805f37a18b6ba164348fd72357ae85fcd45d8b7715ba350bf296b46710c656bd8a
SHA1 hash: 93623507d7147f01a11d4af9d6494a8d2497e94b
MD5 hash: 63314e909cb6681bf0960b734c33a838
humanhash: one-batman-diet-stairway
File name:Item.one
Download: download sample
Signature Quakbot
File size:169'867 bytes
First seen:2023-02-20 11:50:56 UTC
Last seen:Never
File type:Microsoft OneNote (one) one
MIME type:application/octet-stream
ssdeep 3072:FhGtY6enoukFuaYXtfAO2eZMJiE+uSPHRORiw3Rj:FhGtvBxFuXVd2tijTPHROscRj
TLSH T1BAF3F25267E45211E9BF9B311BD2DFEB1607FAA06A27837725C6220C4DD27C0DE5828F
Reporter pr0xylife
Tags:1676886180 BB16 one Qakbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
714
Origin country :
RU RU
Vendor Threat Intelligence
Result
Verdict:
SUSPICIOUS
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.expl
Score:
56 / 100
Signature
Document exploit detected (process start blacklist hit)
Suspicious powershell command line found
Yara detected Malicious OneNote
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 811988 Sample: Item.one Startdate: 20/02/2023 Architecture: WINDOWS Score: 56 36 Yara detected Malicious OneNote 2->36 38 Document exploit detected (process start blacklist hit) 2->38 9 ONENOTE.EXE 55 501 2->9         started        12 ONENOTEM.EXE 2->12         started        process3 file4 30 C:\Users\user\Desktop\Item.one, data 9->30 dropped 32 C:\Users\...\~Item.one.onebackupconstruction, data 9->32 dropped 14 hh.exe 22 9->14         started        16 ONENOTEM.EXE 1 9->16         started        process5 process6 18 cmd.exe 1 14->18         started        signatures7 40 Suspicious powershell command line found 18->40 21 powershell.exe 14 22 18->21         started        24 conhost.exe 18->24         started        process8 dnsIp9 34 165.22.160.25, 49698, 80 DIGITALOCEAN-ASNUS United States 21->34 26 conhost.exe 21->26         started        28 rundll32.exe 21->28         started        process10
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-02-20 11:51:06 UTC
File Type:
Document
AV detection:
1 of 38 (2.63%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops startup file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:OneNote_magic
Author:Stuart Gonzalez
Rule name:SUSP_OneNote
Author:spatronn
Description:Hard-Detect One

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments