MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 820c86717ed36270cd3dd2e4e659d559908ddfbc942686ddcbeec48a321b86c4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: 820c86717ed36270cd3dd2e4e659d559908ddfbc942686ddcbeec48a321b86c4
SHA3-384 hash: ac1dec83dc15d46dab3b87884b35f9ef5a32a4cb192a285150376a23bb86e75406b3ddcc49821b80626b0b5130cdbe1e
SHA1 hash: 5a53f3dc8e4cda7bd92a21361fada7f814c9f3fe
MD5 hash: b1e1d2ea1e2e0936aeb8e3f79ade7406
humanhash: single-william-nebraska-ack
File name:slaughterhouse.temp
Download: download sample
Signature Quakbot
File size:383'488 bytes
First seen:2022-11-18 15:49:09 UTC
Last seen:2022-11-18 17:42:02 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash b121f840f8c504d34a3856981e588e27 (4 x Quakbot)
ssdeep 6144:XKR66t98Uah1oq7PbQIIJSLiyCE0taaRIC6w/9I0FK+20m6WdMxgYURpi92H4X:w6E1YF7P01JSdCLjqa/9cNdMxgligH8
Threatray 2'120 similar samples on MalwareBazaar
TLSH T16F84F062F4F67F10C002957B02AB92B7F59A094C175B8BF38194EB7A75130A07F66B2D
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4505/5/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter pr0xylife
Tags:dll obama223 Qakbot Quakbot

Intelligence


File Origin
# of uploads :
2
# of downloads :
270
Origin country :
RU RU
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Сreating synchronization primitives
Launching a process
Searching for synchronization primitives
Modifying an executable file
Creating a window
Sending a custom TCP request
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Spyware.Bobik
Status:
Malicious
First seen:
2022-11-18 15:50:07 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
8 of 40 (20.00%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:obama223 campaign:1668757345 banker stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Qakbot/Qbot
Malware Config
C2 Extraction:
68.47.128.161:443
87.65.160.87:995
172.90.139.138:2222
86.175.128.143:443
12.172.173.82:465
71.247.10.63:2083
47.41.154.250:443
91.254.215.167:443
71.31.101.183:443
81.229.117.95:2222
24.4.239.157:443
41.99.177.175:443
92.149.205.238:2222
73.230.28.7:443
47.229.96.60:443
186.188.2.193:443
174.112.25.29:2078
84.35.26.14:995
86.130.9.167:2222
116.74.163.221:443
86.195.32.149:2222
80.13.179.151:2222
64.207.237.118:443
24.206.27.39:443
170.253.25.35:443
157.231.42.190:995
170.249.59.153:443
174.101.111.4:443
23.240.47.58:995
99.229.146.120:443
184.155.91.69:443
89.129.109.27:2222
91.169.12.198:32100
87.202.101.164:50000
197.148.17.17:2078
94.63.65.146:443
69.133.162.35:443
24.64.114.59:2078
76.20.42.45:443
71.183.236.133:443
12.172.173.82:990
70.66.199.12:443
45.248.169.101:443
90.104.22.28:2222
90.89.95.158:2222
76.80.180.154:995
176.142.207.63:443
91.165.188.74:50000
72.82.136.90:443
88.126.94.4:50000
64.228.191.212:2222
12.172.173.82:21
142.161.27.232:2222
71.247.10.63:50003
108.6.249.139:443
184.176.154.83:995
174.104.184.149:443
82.34.170.37:443
47.34.30.133:443
71.247.10.63:995
70.64.77.115:443
175.205.2.54:443
92.207.132.174:2222
76.127.192.23:443
182.66.197.35:443
98.147.155.235:443
49.175.72.56:443
82.31.37.241:443
73.36.196.11:443
2.84.98.228:2222
188.54.79.88:995
184.153.132.82:443
74.66.134.24:443
172.117.139.142:995
24.64.114.59:3389
12.172.173.82:2087
78.92.133.215:443
24.64.114.59:2222
50.68.204.71:995
105.184.161.242:443
12.172.173.82:22
221.161.103.6:443
98.145.23.67:443
73.161.176.218:443
50.68.204.71:443
24.142.218.202:443
66.191.69.18:995
183.82.100.110:2222
24.49.232.96:443
70.115.104.126:995
176.151.15.101:443
93.156.103.241:443
86.217.250.15:2222
12.172.173.82:443
173.18.126.3:443
157.231.42.190:443
92.24.200.226:995
187.199.224.16:32103
213.91.235.146:443
188.4.142.139:995
199.83.165.233:443
63.248.148.87:443
58.162.223.233:443
102.159.188.241:443
12.172.173.82:50001
174.45.15.123:443
86.171.75.63:443
75.99.125.238:2222
75.158.15.211:443
79.37.204.67:443
27.110.134.202:995
12.172.173.82:993
58.247.115.126:995
181.118.183.116:443
31.167.227.31:443
2.83.62.105:443
77.126.81.208:443
174.112.25.29:2222
92.106.70.62:2222
Unpacked files
SH256 hash:
eabb423b3ed1b858d66e07db4cff1ff1926231d55df3ea72471ac954fa24bf80
MD5 hash:
7d2c97b3e60c24dfb50ebaf909412c6b
SHA1 hash:
26a348bde9bdb548b9258c955680acfd0805e556
Detections:
Qakbot win_qakbot_auto
SH256 hash:
820c86717ed36270cd3dd2e4e659d559908ddfbc942686ddcbeec48a321b86c4
MD5 hash:
b1e1d2ea1e2e0936aeb8e3f79ade7406
SHA1 hash:
5a53f3dc8e4cda7bd92a21361fada7f814c9f3fe
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_stackstrings
Author:Willi Ballenthin

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments