MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6ebd7e86fa5a82fb062800f9529fede402ab4b758453ee1456197754ca051145. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 5


Intelligence 5 IOCs YARA 3 File information Comments

SHA256 hash: 6ebd7e86fa5a82fb062800f9529fede402ab4b758453ee1456197754ca051145
SHA3-384 hash: 446cb6ae1b8362f357eed7174dd66e6d08838abe0cc7a6fd814071ab061df2007adc3e1116e43e53f89761c4af7063b8
SHA1 hash: d2f8e19566668fed76c130dc04926c5d4f2c200b
MD5 hash: 9a2181e1893e0bba51b6e2d060290024
humanhash: west-beer-robert-winter
File name:Claim#6370.html
Download: download sample
Signature Quakbot
File size:957'953 bytes
First seen:2022-12-02 17:11:44 UTC
Last seen:Never
File type: html
MIME type:text/html
ssdeep 12288:nUYf1Nq4RLGZtQ9I85p2pwd8WP+pDnpoSwE0vjYVzD5e8AY1+CRHHaT3Iz:zGELSQ9Ihw/0DZ0vcFjAiO+
TLSH T116150274CF18DFB94FA05A1D04DE1A097EB85E679096ACC27E9FEC0B5B5AD00016B6CC
Reporter k3dg3___
Tags:html obama225 pw abc242 qbot Quakbot TA570

Intelligence


File Origin
# of uploads :
1
# of downloads :
175
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
qbot
Result
Verdict:
UNKNOWN
Details
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Result
Threat name:
HtmlDropper
Detection:
malicious
Classification:
troj
Score:
52 / 100
Signature
Uses 7zip to decompress a password protected archive
Yara detected Html Dropper
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 759408 Sample: Claim#6370.html Startdate: 02/12/2022 Architecture: WINDOWS Score: 52 35 Yara detected Html Dropper 2->35 8 chrome.exe 18 8 2->8         started        11 chrome.exe 2->11         started        process3 dnsIp4 29 192.168.2.1 unknown unknown 8->29 31 192.168.2.5 unknown unknown 8->31 33 239.255.255.250 unknown Reserved 8->33 13 unarchiver.exe 4 8->13         started        16 chrome.exe 8->16         started        process5 dnsIp6 37 Uses 7zip to decompress a password protected archive 13->37 19 7za.exe 2 13->19         started        23 clients.l.google.com 142.250.185.142, 443, 49697 GOOGLEUS United States 16->23 25 www.google.com 172.217.18.100, 443, 49704, 49733 GOOGLEUS United States 16->25 27 3 other IPs or domains 16->27 signatures7 process8 process9 21 conhost.exe 19->21         started       
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:MAL_QBot_HTML_Smuggling_Indicators_Oct22_1
Author:Florian Roth
Description:Detects double encoded PKZIP headers as seen in HTML files used by QBot
Reference:https://twitter.com/ankit_anubhav/status/1578257383133876225?s=20&t=Bu3CCJCzImpTGOQX_KGsdA
Rule name:QBOT_HTMLSmuggling_a
Author:Ankit Anubhav - ankitanubhav.info
Description:Detects QBOT HTML smuggling variants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Quakbot

html 6ebd7e86fa5a82fb062800f9529fede402ab4b758453ee1456197754ca051145

(this sample)

8cb21de414adf9b4f81d2aaac1ba2e947f09a1913b4541d5ff59ef262efefa5d

  
Dropping
SHA256 8cb21de414adf9b4f81d2aaac1ba2e947f09a1913b4541d5ff59ef262efefa5d
  
Delivery method
Distributed via e-mail attachment

Comments