MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7f2eb84749c19f521a9a1ab46fbd133e95b971c63f216a6fcf53edca62748400. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 7f2eb84749c19f521a9a1ab46fbd133e95b971c63f216a6fcf53edca62748400
SHA3-384 hash: a8d52406d3b8eeb2df65a8c02434abf3a0d71e505c2948ce71e1547586ae65f3a2a4e0bfc00018be10cf7e9c5c344ca2
SHA1 hash: 57ae53b15aa129791aa2745ce3bba3385f4b3759
MD5 hash: c2b307f0abcdbc162087c166b638786c
humanhash: venus-speaker-magnesium-cold
File name:7f2eb84749c19f521a9a1ab46fbd133e95b971c63f216a6fcf53edca62748400
Download: download sample
Signature Quakbot
File size:305'640 bytes
First seen:2021-02-03 10:29:27 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 5a9f8697ac3858ea5a90a2d4f246b70c (15 x Quakbot)
ssdeep 6144:nMLWCfv7np6D1NaWF88siwzYiPU8PDUuX3hU:n8WCfv7n21NaH9ZzYbAUGy
Threatray 85 similar samples on MalwareBazaar
TLSH BD54E122B291C836E762EE788F0AB315E4BBBC113D36144AE2D50F0D4D7D5A06F586DB
Reporter JAMESWT_WT
Tags:Qakbot qbot Quakbot signed Sore Loser Games ApS

Code Signing Certificate

Organisation:Sore Loser Games ApS
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Jan 27 00:00:00 2021 GMT
Valid to:Jan 27 23:59:59 2022 GMT
Serial number: 37F3384B16D4EEF0A9B3344B50F1D8A3
Intelligence: 12 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: 2435FF834050871FD7FA41FD3349CBCEE044C30FD8FC988DAB146F9E41134592
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
215
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Launching a process
Modifying an executable file
Creating a process with a hidden window
Creating a window
Sending a UDP request
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Infostealer.QBot
Status:
Malicious
First seen:
2021-02-02 17:41:17 UTC
File Type:
PE (Dll)
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:abc123 campaign:1612275762 banker stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Loads dropped DLL
Qakbot/Qbot
Malware Config
C2 Extraction:
196.151.252.84:443
216.201.162.158:443
83.110.12.140:2222
105.186.102.16:443
108.31.15.10:995
193.248.221.184:2222
68.225.60.77:995
197.45.110.165:995
89.3.198.238:443
81.97.154.100:443
81.214.126.173:2222
108.46.145.30:443
71.187.170.235:443
72.240.200.181:2222
81.88.254.62:443
98.240.24.57:443
86.97.8.249:443
75.136.40.155:443
79.129.121.81:995
37.211.90.175:995
2.7.69.217:2222
78.63.226.32:443
80.227.5.69:443
47.22.148.6:443
125.63.101.62:443
181.48.190.78:443
41.39.134.183:443
78.97.207.104:443
188.25.63.105:443
68.131.107.37:443
172.78.30.215:443
90.101.117.122:2222
81.150.181.168:2222
45.77.115.208:2222
85.52.72.32:2222
76.110.113.71:995
106.51.52.111:443
75.67.192.125:443
172.115.177.204:2222
83.110.103.152:443
71.74.12.34:443
149.28.99.97:2222
207.246.116.237:2222
207.246.77.75:443
45.32.211.207:2222
149.28.101.90:995
149.28.101.90:8443
45.32.211.207:443
207.246.77.75:8443
149.28.98.196:995
207.246.116.237:995
45.63.107.192:2222
45.63.107.192:443
144.202.38.185:443
149.28.98.196:443
45.63.107.192:995
149.28.101.90:443
149.28.99.97:995
45.77.115.208:443
207.246.77.75:995
144.202.38.185:2222
45.32.211.207:8443
149.28.99.97:443
149.28.101.90:2222
207.246.116.237:443
144.202.38.185:995
207.246.116.237:8443
207.246.77.75:2222
149.28.98.196:2222
45.32.211.207:995
175.141.219.71:443
184.189.122.72:443
176.181.247.197:443
77.27.174.49:995
92.59.35.196:2222
51.9.198.164:2222
24.139.72.117:443
98.121.187.78:443
45.77.115.208:8443
45.77.115.208:995
172.87.157.235:3389
85.58.200.50:2222
41.205.16.1:443
50.240.77.238:22
95.77.223.148:443
24.50.118.93:443
84.72.35.226:443
86.220.60.133:2222
184.179.14.130:22
190.85.91.154:443
24.152.219.253:995
70.126.76.75:443
160.3.187.114:443
64.121.114.87:443
67.8.103.21:443
50.244.112.106:443
83.110.108.181:2222
37.211.83.41:443
140.82.49.12:443
80.11.173.82:8443
125.209.114.182:995
213.60.147.140:443
71.88.193.17:443
197.161.154.132:443
85.132.36.111:2222
2.232.253.79:995
68.186.192.69:443
24.43.22.218:993
105.198.236.101:443
46.153.119.255:995
151.60.14.100:443
86.236.77.68:2222
86.98.93.124:2078
31.5.21.66:995
203.198.96.37:443
151.245.68.56:32103
50.29.166.232:995
106.250.150.98:443
76.25.142.196:443
202.184.20.119:443
115.133.243.6:443
27.223.92.142:995
82.76.47.211:443
122.148.156.131:995
173.21.10.71:2222
125.239.152.76:995
144.139.47.206:443
45.46.53.140:2222
144.139.166.18:443
67.6.12.4:443
76.111.128.194:443
75.136.26.147:443
75.118.1.141:443
65.27.228.247:443
74.77.162.33:443
100.2.123.122:443
69.123.179.70:443
70.26.7.67:2222
199.19.117.131:443
71.197.126.250:443
201.170.168.142:995
72.48.124.36:443
186.28.51.27:443
172.87.134.226:995
97.69.160.4:2222
67.165.206.193:993
72.252.201.69:443
74.68.144.202:443
89.137.211.239:995
70.54.25.76:2222
Unpacked files
SH256 hash:
f04f4f4db782ac36efeb2222c7f4e8609b152811d12ba88dccba218f7fca63d6
MD5 hash:
69315eec4f4d5baa0f0d384a82beaf3e
SHA1 hash:
664f35cf060a71bd9299146fbe912d04a1d54d44
SH256 hash:
7f2eb84749c19f521a9a1ab46fbd133e95b971c63f216a6fcf53edca62748400
MD5 hash:
c2b307f0abcdbc162087c166b638786c
SHA1 hash:
57ae53b15aa129791aa2745ce3bba3385f4b3759
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments