MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7d1d7d196b3932e4e3e7cc1159f0e3ebab252f6a5f1ed6000f78d2133052a0de. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: 7d1d7d196b3932e4e3e7cc1159f0e3ebab252f6a5f1ed6000f78d2133052a0de
SHA3-384 hash: 87f31f17ca7c3bb6ce87a43026f943f4ba64d1f24ba5f050edc8f989f7d4a4c59fb04b5942614c1670497600845f2f9e
SHA1 hash: 216245cbc0f76a9f7d5a683c1711607c820733c7
MD5 hash: cdc5da43956726646ad0efdc6be15858
humanhash: magnesium-leopard-helium-oxygen
File name:AFL27.zip
Download: download sample
Signature Quakbot
File size:435'392 bytes
First seen:2022-11-28 13:09:03 UTC
Last seen:Never
File type: zip
MIME type:application/zip
Note:This file is a password protected archive. The password is: P32M
ssdeep 12288:w8ni+PUdnmWVtqLT/VjHSJnWByBPQnZBVCIOs4Lj4aHVvdjd:NniUU8WTqLTtj2WUmX9rCj4Gld
TLSH T12794238E0D0B2B59D228D9BE905745D6437BDBEEC8D4E506C739972C80D2CF51AB8F28
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter pr0xylife
Tags:1669628564 BB08 pw-P32M Qakbot Quakbot zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
254
Origin country :
RU RU
File Archive Information

This file archive contains 4 file(s), sorted by their relevance:

File name:data.txt
File size:645'120 bytes
SHA256 hash: 9a6a43b0cdd989c911896933202401b848d2502db0219632f3aaa04a2e4687a4
MD5 hash: 58329a65cac27867d2777390f4eac0eb
MIME type:text/plain
Signature Quakbot
File name:opalescent.jpg
File size:27'062 bytes
SHA256 hash: 5fe310354508efaf34d2da0af9b1c2e61e6b1d785698f7ca98fb85ed1a565618
MD5 hash: e5f0f548e522f0ae14c10f7cf6d41b54
MIME type:image/jpeg
Signature Quakbot
File name:flours.js
File size:9'491 bytes
SHA256 hash: d0f396309db14bbe988e8ae6ba6dfb4451fc9db830484dcb7dec830b74d8467a
MD5 hash: b6377f4364852191e440269dc0225850
MIME type:text/plain
Signature Quakbot
File name:gratiae.ps1
File size:367 bytes
SHA256 hash: e6f4fe47c6e08c3b995b5e69efee09a853426607d64715bb1cf215640f785d58
MD5 hash: 5479e1a9617b0222d0a8f001c63fb23b
MIME type:text/plain
Signature Quakbot
Vendor Threat Intelligence
Gathering data
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:bb08 campaign:1669628564 banker stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Loads dropped DLL
Qakbot/Qbot
Malware Config
C2 Extraction:
98.147.155.235:443
85.52.73.34:2222
75.158.15.211:443
2.91.184.252:995
92.106.70.62:2222
85.152.152.46:443
86.159.48.25:2222
217.128.91.196:2222
92.11.189.236:2222
83.92.85.93:443
2.83.62.105:443
93.24.192.142:20
76.20.42.45:443
24.64.114.59:2078
73.36.196.11:443
130.43.99.103:995
172.117.139.142:995
100.16.107.117:443
12.172.173.82:22
176.151.15.101:443
50.68.204.71:443
58.162.223.233:443
50.68.204.71:993
108.162.6.34:995
24.142.218.202:443
174.112.25.29:2078
190.207.253.41:2222
66.191.69.18:995
85.241.180.94:443
149.126.159.106:443
75.141.227.169:443
31.167.227.31:443
173.18.126.3:443
184.153.132.82:443
176.142.207.63:443
82.9.210.36:443
87.221.197.110:2222
174.104.184.149:443
98.145.23.67:443
12.172.173.82:993
24.64.114.59:2222
116.75.63.225:443
136.232.184.134:995
77.126.81.208:443
62.31.130.138:465
75.99.125.235:2222
173.239.94.212:443
92.186.69.229:2222
92.24.200.226:995
109.218.104.206:2222
87.223.85.4:443
24.206.27.39:443
69.119.123.159:2222
64.121.161.102:443
91.169.12.198:32100
58.247.115.126:995
187.199.224.16:32103
123.3.240.16:995
122.178.197.139:995
102.156.232.220:443
12.172.173.82:995
92.98.228.28:2222
86.98.182.30:2222
90.116.219.167:2222
92.27.86.48:2222
93.156.103.241:443
85.7.61.22:2222
105.109.140.201:32103
86.225.214.138:2222
76.100.159.250:443
93.147.235.8:443
75.143.236.149:443
94.63.65.146:443
74.92.243.113:50000
75.98.154.19:443
216.196.245.102:2222
83.110.223.247:443
121.122.99.223:995
70.120.228.205:2083
47.229.96.60:443
86.171.75.63:443
89.129.109.27:2222
136.244.25.165:443
92.137.74.174:2222
78.69.251.252:2222
175.205.2.54:443
12.172.173.82:465
92.185.204.18:2078
58.186.75.42:443
76.80.180.154:995
84.35.26.14:995
190.18.236.175:443
47.41.154.250:443
190.11.198.66:443
81.229.117.95:2222
190.39.199.51:443
197.3.64.204:995
213.67.255.57:2222
86.195.32.149:2222
70.115.104.126:995
24.64.114.59:3389
216.196.245.102:2083
108.162.6.34:443
50.90.249.161:443
170.253.25.35:443
103.144.201.62:2078
24.64.114.59:50010
23.240.47.58:995
45.248.169.101:443
92.239.81.124:443
83.21.138.251:2222
80.13.179.151:2222
184.155.91.69:443
193.154.207.221:443
90.104.22.28:2222
71.247.10.63:50003
108.6.249.139:443
184.176.154.83:995
174.77.209.5:443
100.8.168.108:443
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PassProtected_ZIP_ISO_file
Author:_jc
Description:Detects container formats commonly smuggled through password-protected zips

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments