MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a59ead9d0a1d3217125510152aa887e9ebeee440f4e8dd1dc2300cdd2bc84b1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 7a59ead9d0a1d3217125510152aa887e9ebeee440f4e8dd1dc2300cdd2bc84b1
SHA3-384 hash: 5681de66231a3df46742e511ba01d40eaac6051626fd28290d84e183a59e6d660e018665d0d676f94147e119fffeb145
SHA1 hash: 8742eea4bc34e6665360d73ce182b1d7ce475804
MD5 hash: 6cb8066608da3e38e7497c3a038c632c
humanhash: moon-artist-nebraska-jersey
File name:fnorefer.dll
Download: download sample
Signature Quakbot
File size:548'352 bytes
First seen:2022-01-31 14:50:58 UTC
Last seen:2022-01-31 16:59:52 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash edc35d61ceebdfca301ba5422ad04ecc (4 x Quakbot, 2 x Matanbuchus, 1 x BelialDropper)
ssdeep 12288:R+CvUhJUun9nVn5uSKoseGqR2LT8EqeOkXtjEymnk:QO3Q5UHLTX3tjdm
Threatray 2 similar samples on MalwareBazaar
TLSH T187C48D2AF6D08437E2722A3D8C5B9254A8397E412D295C8D3BE42F8C5F39742376539F
File icon (PE):PE icon
dhash icon 399998ecd4d46c0e (572 x Quakbot, 137 x ArkeiStealer, 82 x GCleaner)
Reporter JAMESWT_WT
Tags:dll qbot Quakbot

Intelligence


File Origin
# of uploads :
2
# of downloads :
214
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe greyware keylogger packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
72 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.Qshell
Status:
Malicious
First seen:
2022-01-31 14:51:11 UTC
File Type:
PE (Dll)
Extracted files:
40
AV detection:
10 of 43 (23.26%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
7a59ead9d0a1d3217125510152aa887e9ebeee440f4e8dd1dc2300cdd2bc84b1
MD5 hash:
6cb8066608da3e38e7497c3a038c632c
SHA1 hash:
8742eea4bc34e6665360d73ce182b1d7ce475804
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments