MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 827db42a714ce9009c887b8363f4c537a08bb6cdc3b20186c8d1eff604e955ec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 827db42a714ce9009c887b8363f4c537a08bb6cdc3b20186c8d1eff604e955ec
SHA3-384 hash: 194d6aaf0bf1ca9ad752699c44ac8e39155c38f14f821961e44a9b8b2f43330a7e55adbcc1b18d5e30d50d53685a848c
SHA1 hash: ad44153a1645b9f387554481eb9ac4a1475b975a
MD5 hash: ccc881887b082f890b5e9437899995c1
humanhash: quebec-michigan-oranges-glucose
File name:827db42a714ce9009c887b8363f4c537a08bb6cdc3b20186c8d1eff604e955ec
Download: download sample
Signature QuakBot
File size:1'084'416 bytes
First seen:2020-11-07 17:21:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c1e35a855d20d45e9c84f5bd029dd388 (154 x Quakbot)
ssdeep 6144:bg/+Oq/OclIARD83dtkFICdy20syNbDsuZ31EyNEgfddMtjKkeGInR+HlZzmU6Mh:bjWclhOvxn20aK2KLUUhulLhJ9FCe
TLSH 623512D7F9BC8471CAED297F8993123C968A85E85D05D10B0778A5ADBDF3200FE9244B
Reporter seifreed
Tags:Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
54
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Forced shutdown of a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-11-07 17:27:38 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
827db42a714ce9009c887b8363f4c537a08bb6cdc3b20186c8d1eff604e955ec
MD5 hash:
ccc881887b082f890b5e9437899995c1
SHA1 hash:
ad44153a1645b9f387554481eb9ac4a1475b975a
SH256 hash:
e60a65e864155dca96aaa53a46cfd0c91616ac51aeb149da0be7c513bdd64a3d
MD5 hash:
21d7f5d5d4da91e93804330252690cd0
SHA1 hash:
b0710a695dd11cf64f8bef3945cc20f1145c26c3
Detections:
win_qakbot_g0 win_qakbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments