MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 760e82acfcfdb3f7a2ea01cb32a21562bf98d4855cca19710aabd4af329aa809. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: 760e82acfcfdb3f7a2ea01cb32a21562bf98d4855cca19710aabd4af329aa809
SHA3-384 hash: 72c36c8ff3f8f322139ef97b6dbf739ba8bf61454aca189034da6b2a9b0c81e6a6db9e7c20866f6f083c11efdc1d0ec7
SHA1 hash: 2076d9ecbcec60b0b4fc181917fd85246037f1cc
MD5 hash: 187f43c716b1f67efa2e3e98027f497e
humanhash: beer-ink-mexico-stairway
File name:8888888
Download: download sample
Signature Quakbot
File size:1'080'848 bytes
First seen:2020-06-15 13:28:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 93db9e1a661226e5f0703077e1fe6a93 (1 x Quakbot)
ssdeep 12288:m2UML/axdZP+4gSyUaYV6TaHH7cNQTLBR32Yrm2T:m2UM7wg1Ua86sHgNQTVR32Ya2T
Threatray 419 similar samples on MalwareBazaar
TLSH C935E00BBCE3567FD611CC75847202B1B962FF4E9105AC6B3F84F41B68E1AA30952E5B
Reporter JAMESWT_WT
Tags:Qakbot Quakbot

Code Signing Certificate

Organisation:QIJNAOFJMEMPPPJXNK
Issuer:QIJNAOFJMEMPPPJXNK
Algorithm:sha1WithRSA
Valid from:Jun 13 08:42:44 2020 GMT
Valid to:Dec 31 23:59:59 2039 GMT
Serial number: 38B8C75FADF02BAC4FA81A70F7F5016C
Thumbprint Algorithm:SHA256
Thumbprint: BC4AAACCC15D0F0A9B013B5C165B5F860C5D2B8066200CE2A3770B7F07DB0B03
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
210
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.QBot
Status:
Malicious
First seen:
2020-06-15 13:30:07 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
26 of 30 (86.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:spx140 campaign:1592218484 banker cryptone packer stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Loads dropped DLL
Executes dropped EXE
CryptOne packer
Qakbot/Qbot
Malware Config
C2 Extraction:
141.126.10.226:443
96.35.170.82:2222
67.250.184.157:443
24.42.14.241:995
72.173.20.55:443
173.172.205.216:443
173.3.132.17:995
172.78.30.215:443
207.255.161.8:32103
206.51.202.106:50003
24.152.219.253:995
207.255.161.8:2222
80.14.209.42:2222
72.142.106.198:465
207.255.161.8:2087
142.129.227.86:443
98.219.77.197:443
166.62.180.194:2078
82.127.193.151:2222
24.229.245.124:995
104.50.141.139:995
50.247.230.33:995
207.255.161.8:2078
193.23.5.134:443
65.24.76.114:443
67.246.16.250:995
24.99.180.247:443
151.73.124.242:443
81.245.66.237:995
86.127.13.79:21
96.18.240.158:443
65.116.179.83:443
188.173.185.139:443
200.113.201.83:993
93.118.83.174:443
98.16.204.189:995
72.36.59.46:2222
67.165.206.193:995
184.180.157.203:2222
49.191.4.245:443
104.221.4.11:2222
72.204.242.138:20
140.82.21.191:443
203.33.138.230:443
76.86.57.179:2222
64.19.74.29:995
73.104.218.229:0
201.209.4.83:2078
72.177.157.217:995
65.100.247.6:2083
82.77.169.118:2222
156.213.179.74:443
118.168.236.121:443
85.121.42.12:995
188.173.214.88:443
36.236.233.206:443
122.147.204.4:995
73.244.83.199:443
188.192.75.8:443
89.212.207.43:443
67.182.188.217:443
46.214.86.217:443
75.81.25.223:443
75.170.118.26:443
84.255.149.19:443
79.116.229.37:443
173.245.152.231:443
5.13.84.244:995
95.76.31.12:443
98.121.187.78:443
178.221.64.104:995
93.118.209.198:443
89.137.162.193:443
69.11.247.242:443
207.255.161.8:32100
73.217.4.42:443
82.81.172.21:443
50.244.112.106:443
216.163.4.132:443
68.190.152.98:443
75.110.250.89:443
35.142.12.163:2222
68.200.23.189:443
80.195.103.146:2222
86.153.98.37:2222
36.77.151.211:443
100.38.123.22:443
76.189.50.251:443
173.170.121.166:443
77.159.149.74:443
96.41.93.96:443
108.54.205.207:443
76.187.8.160:443
96.56.237.174:32103
173.175.29.210:443
203.198.96.69:443
117.218.208.239:443
72.204.242.138:32100
51.223.2.17:443
79.115.254.172:443
188.192.75.8:995
86.126.97.183:2222
81.133.234.36:2222
78.96.192.26:443
98.116.62.242:443
189.231.198.212:443
62.121.85.253:995
173.187.101.221:443
104.235.72.17:443
72.204.242.138:53
105.100.66.69:443
197.165.161.55:995
86.120.53.204:443
72.29.181.77:2078
24.122.228.88:443
216.229.92.42:995
101.108.113.210:443
67.83.54.76:2222
5.193.61.212:2222
45.77.215.141:443
1.40.42.4:443
70.95.118.217:443
86.121.95.197:2222
207.246.71.122:443
144.202.48.107:443
201.215.29.153:443
64.224.76.152:443
41.228.204.87:443
108.39.93.45:443
97.93.211.17:443
83.110.222.11:443
69.92.54.95:995
66.222.88.126:995
207.255.161.8:32102
24.122.157.93:443
203.122.7.82:443
24.43.22.220:993
74.75.216.202:443
100.4.173.223:443
68.225.56.31:443
72.204.242.138:32102
108.190.151.108:2222
190.158.225.3:443
50.244.112.10:443
24.183.39.93:443
39.37.232.43:995
24.43.22.220:995
72.209.191.27:443
79.114.199.39:443
71.187.170.235:443
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_qakbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments