MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6f7d90eaf620223280720a36a4e2e43ffa1d7b5870f5c04962a3e204252c2d93. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 6f7d90eaf620223280720a36a4e2e43ffa1d7b5870f5c04962a3e204252c2d93
SHA3-384 hash: a72cade046fedc7c20e56cb734f6bd6427b1966eb47446d52dcdf4b938b9da54c1bf571f3c1e6ce5ca3399648b273250
SHA1 hash: d738a66aabf12da845691129c613c68ec03021ed
MD5 hash: 1608335e1d7c1e187db45a819888cde0
humanhash: pennsylvania-georgia-six-mockingbird
File name:SecuriteInfo.com.Trojan.Agent.FAPR.6060.15343
Download: download sample
Signature Quakbot
File size:630'200 bytes
First seen:2020-12-16 09:45:37 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash f9b313cba51ee7ed5f7a2c59225a0d14 (1 x Quakbot)
ssdeep 6144:NpUwE0IMoNmL7x4SVbBSabPTeboxqoTkEaWrag4paWTvdWKSfU+eh:QrFNmLKSV1JbPT+4xrOSA
Threatray 4 similar samples on MalwareBazaar
TLSH 06D45CE7FD197CD9C16823B27793963C0917EB99213CC80915B3FA0A19F62D27926F09
Reporter SecuriteInfoCom
Tags:Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
215
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Launching a process
Modifying an executable file
Creating a process with a hidden window
Creating a window
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Adware.Maltrec
Status:
Malicious
First seen:
2020-12-16 09:46:08 UTC
AV detection:
11 of 48 (22.92%)
Threat level:
  1/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:abc113 campaign:1608027772 banker stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Suspicious use of AdjustPrivilegeToken
Program crash
Loads dropped DLL
Qakbot/Qbot
Malware Config
C2 Extraction:
35.139.242.207:443
71.117.132.169:443
39.36.112.67:995
90.201.21.58:443
188.210.229.205:443
86.121.43.200:443
202.188.138.162:443
51.235.149.29:443
113.193.187.2:995
217.133.54.140:32100
47.44.217.98:443
81.97.154.100:443
72.66.47.70:443
193.248.154.174:2222
80.227.5.70:443
140.82.49.12:443
24.139.72.117:443
64.225.166.16:2222
189.183.206.109:443
111.95.212.237:2222
190.220.8.10:995
109.154.79.222:2222
83.110.250.71:995
149.28.99.97:2222
45.63.107.192:443
149.28.101.90:2222
149.28.101.90:995
149.28.99.97:443
149.28.98.196:443
144.202.38.185:2222
45.77.115.208:995
149.28.98.196:2222
149.28.98.196:995
149.28.99.97:995
45.63.107.192:2222
144.202.38.185:995
144.202.38.185:443
45.63.107.192:995
5.13.84.186:995
68.83.89.188:443
67.141.11.98:443
219.76.148.249:443
86.245.82.249:2078
116.240.78.45:995
37.182.244.124:2222
72.186.1.237:443
78.97.207.104:443
80.14.22.234:2222
202.141.225.158:443
72.28.255.159:995
46.190.52.113:2222
161.142.217.62:443
188.253.85.49:995
217.165.3.30:443
90.61.38.208:2222
2.49.219.254:22
124.29.232.108:443
2.50.143.154:2222
2.50.2.216:443
197.161.154.132:443
103.76.160.110:443
51.223.138.251:443
102.185.13.89:443
85.101.187.146:443
92.154.83.96:2087
45.118.216.157:443
86.122.248.164:2222
92.154.83.96:1194
217.165.125.217:443
92.154.83.96:2078
85.105.29.218:443
151.60.38.21:443
156.213.217.254:443
2.50.57.224:443
217.162.149.212:443
182.161.6.57:3389
24.27.82.216:2222
73.156.64.203:443
45.77.115.208:2222
203.106.116.190:443
85.52.72.32:2222
2.51.240.250:995
2.91.9.248:443
101.109.175.33:443
41.228.47.147:443
78.101.199.138:995
125.63.101.62:443
90.53.103.26:2222
86.124.93.144:443
79.114.177.162:993
5.2.212.254:443
86.127.22.190:443
81.133.234.36:2222
5.15.109.245:443
37.130.115.124:443
2.50.88.125:995
62.38.114.12:2222
78.181.19.134:443
187.155.59.73:443
102.187.95.88:443
79.129.216.215:2222
141.237.135.194:443
42.117.61.10:443
93.148.241.179:2222
41.205.16.222:443
46.53.2.70:443
151.61.125.180:2222
151.73.121.136:443
176.181.247.197:443
149.28.101.90:8443
2.7.69.217:2222
84.117.176.32:443
109.205.204.229:2222
184.179.14.130:22
203.106.195.67:443
121.58.199.24:443
216.201.162.158:443
83.110.13.182:2222
172.87.157.235:3389
45.118.65.34:443
79.129.252.62:2222
2.50.30.147:995
2.50.159.104:2222
105.198.236.101:443
78.96.199.79:443
172.91.19.192:443
196.204.207.111:443
77.132.113.187:2222
185.163.221.77:2222
197.49.240.8:995
45.77.115.208:8443
108.30.125.94:443
213.60.147.140:443
217.165.9.48:443
94.70.36.227:2222
59.99.36.20:443
104.37.20.207:995
5.193.106.230:2078
117.215.198.5:443
2.50.49.18:22
2.88.1.76:995
66.25.168.167:2222
173.21.10.71:2222
106.250.150.98:443
58.152.9.133:443
72.36.59.46:2222
89.137.211.239:995
96.241.66.126:443
93.86.1.159:995
Unpacked files
SH256 hash:
0ca1bd1d0e4a9733b497c14fc5379fa0894937859e8c40cad0b48154112cc4a4
MD5 hash:
0ea3240f54adde3b82e75cfee3acd2e5
SHA1 hash:
70ceb582308af6961e1e19741bc4dee4f1bf9745
SH256 hash:
6f7d90eaf620223280720a36a4e2e43ffa1d7b5870f5c04962a3e204252c2d93
MD5 hash:
1608335e1d7c1e187db45a819888cde0
SHA1 hash:
d738a66aabf12da845691129c613c68ec03021ed
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments