MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6ca8c7e8acaec97b05aa175a11e2e474621706a320eca4b1b0096d6a150c162c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 6ca8c7e8acaec97b05aa175a11e2e474621706a320eca4b1b0096d6a150c162c
SHA3-384 hash: 6edeba6d7dc5a09ad7be3881d497b1d9f4f858a996939d2980d33b68819cc72bd51c70fa78fad55c3d28ee18b2a23f72
SHA1 hash: 84bf3b6cbfb862946a0afc7613cd5a9f96eb650e
MD5 hash: 21494f5e3d02e15bdcc09f5777520d71
humanhash: hawaii-maine-arkansas-nitrogen
File name:6ca8c7e8acaec97b05aa175a11e2e474621706a320eca4b1b0096d6a150c162c
Download: download sample
Signature QuakBot
File size:271'872 bytes
First seen:2020-11-10 10:55:14 UTC
Last seen:2024-07-24 15:30:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 015974618e9105226f001019d35e62e5 (1'506 x Quakbot)
ssdeep 6144:DLfhdM/bXZswyIyO6t0nh7lqoDKOAP4PshaoI:nvKbXWNmVHelmEaoI
Threatray 976 similar samples on MalwareBazaar
TLSH 2444F12324759436F81607F68DA6D2B10D6E7868AA3145CF3FC85348072E9B28F777DA
Reporter seifreed
Tags:Quakbot

Intelligence


File Origin
# of uploads :
2
# of downloads :
58
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.PinkSbot
Status:
Malicious
First seen:
2020-11-10 10:57:02 UTC
AV detection:
31 of 48 (64.58%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
6ca8c7e8acaec97b05aa175a11e2e474621706a320eca4b1b0096d6a150c162c
MD5 hash:
21494f5e3d02e15bdcc09f5777520d71
SHA1 hash:
84bf3b6cbfb862946a0afc7613cd5a9f96eb650e
SH256 hash:
f62038ddf7fc42ba4c744138d9c2ed772cd91824bff49a578d9a52f1d995c2eb
MD5 hash:
aa68778bcc5f584063994a83e50a86d4
SHA1 hash:
0630d490d74da04b68328187d398107a38627f9a
Detections:
win_qakbot_g0 win_qakbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments