MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 78abc92488d49165ca64ad2a169febbdba6ca105cb6fe18b02c660b6fb867588. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 78abc92488d49165ca64ad2a169febbdba6ca105cb6fe18b02c660b6fb867588
SHA3-384 hash: ab2da070e5e43eb7ebbf3a82e6d6995dec16bd171c723a8185a7e77452dc89e00f8d28eac8a815dafbedf4afc68d092e
SHA1 hash: 313dba40c51d7f528f71f715b91bccff3de22375
MD5 hash: 2179b15d3f854bee787ad8767e61ab75
humanhash: music-winner-romeo-montana
File name:44508.5578762731.dat
Download: download sample
Signature Quakbot
File size:282'624 bytes
First seen:2021-11-12 16:48:38 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash b6a19f1001dd6b1b07bd285855d8f1af (2 x Quakbot)
ssdeep 6144:049vqTPawAYktAs6hreUG77RABKCEa7exK/p/:049vqTMfARhg5ABKZNxK/l
Threatray 367 similar samples on MalwareBazaar
TLSH T132546BD1E908A786F5DA4C7E0639E57115E34D389AA480DB77FB3E0330B39E21536E0A
File icon (PE):PE icon
dhash icon e486aaca8accf470 (2 x Quakbot)
Reporter malwarelabnet
Tags:dll Qakbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
254
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2021-11-12 16:49:05 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:obama127 campaign:1636711808 banker evasion stealer trojan
Behaviour
Creates scheduled task(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Loads dropped DLL
Qakbot/Qbot
Windows security bypass
Malware Config
C2 Extraction:
136.232.34.70:443
181.118.183.31:443
72.252.147.208:465
94.200.181.154:443
71.13.93.154:2083
96.21.251.127:2222
182.176.180.73:443
88.234.20.155:995
41.228.22.180:443
89.137.52.44:443
102.65.38.57:443
94.196.209.83:995
207.246.112.221:995
207.246.112.221:443
39.49.116.108:995
190.73.3.148:2222
63.143.92.99:995
216.238.71.31:443
216.238.71.31:995
216.238.72.121:443
216.238.72.121:995
2.222.167.138:443
87.109.236.83:995
105.198.236.99:995
89.101.97.139:443
140.82.49.12:443
96.246.158.154:995
71.13.93.154:6881
103.142.10.177:443
123.252.190.14:443
136.143.11.232:443
117.248.109.38:21
93.48.80.198:995
76.25.142.196:443
187.121.88.3:995
45.9.20.200:2211
201.172.31.95:80
120.150.218.241:995
27.223.92.142:995
75.188.35.168:443
45.46.53.140:2222
75.169.58.229:32100
73.151.236.31:443
103.143.8.71:995
173.21.10.71:2222
189.135.98.193:443
71.74.12.34:443
115.186.190.72:995
50.194.160.233:443
41.37.243.129:443
189.223.33.109:443
73.140.38.124:443
65.100.174.110:8443
189.147.225.12:443
100.1.119.41:443
79.160.207.214:443
72.252.147.208:995
50.194.160.233:32100
50.194.160.233:465
109.12.111.14:443
181.4.49.208:465
108.4.67.252:443
83.223.164.163:443
24.55.112.61:443
24.139.72.117:443
77.57.204.78:443
24.229.150.54:995
78.153.126.175:443
71.13.93.154:2222
115.96.64.9:995
117.198.155.237:443
94.60.254.81:443
109.177.77.68:995
86.97.8.204:443
86.98.1.197:443
93.147.212.206:443
86.8.177.143:443
68.204.7.158:443
81.250.153.227:2222
197.87.182.15:443
91.178.126.51:995
146.66.139.84:443
103.116.178.85:993
67.165.206.193:993
75.66.88.33:443
94.110.12.148:995
111.250.56.31:443
189.146.127.83:443
93.48.58.123:2222
96.37.113.36:993
68.186.192.69:443
92.59.35.196:2222
86.173.96.126:443
109.133.93.127:995
80.6.192.58:443
109.228.255.59:443
176.35.109.202:2222
72.27.126.188:995
103.150.40.76:995
103.143.8.71:443
185.53.147.51:443
162.244.227.34:443
216.201.162.158:443
39.52.224.170:995
188.27.119.243:443
73.25.109.183:2222
47.72.219.120:995
196.207.140.50:995
115.96.188.188:995
Unpacked files
SH256 hash:
26c4aebb7663fea17dfa1bc1dad5eed4dc0f7feee0714f437ca774d07e390ae6
MD5 hash:
51f64a7f4cfe64198d00e507456c8eab
SHA1 hash:
f8a93c318cb4c9413e20dd1a6b85aad7cd01975d
SH256 hash:
78abc92488d49165ca64ad2a169febbdba6ca105cb6fe18b02c660b6fb867588
MD5 hash:
2179b15d3f854bee787ad8767e61ab75
SHA1 hash:
313dba40c51d7f528f71f715b91bccff3de22375
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:QakBot
Author:kevoreilly
Description:QakBot Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments