MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 82af67585343100b3f745739e09896f6b2068759ac2ce30a908d4b7bab7eb2aa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 12


Intelligence 12 IOCs YARA 4 File information Comments

SHA256 hash: 82af67585343100b3f745739e09896f6b2068759ac2ce30a908d4b7bab7eb2aa
SHA3-384 hash: 88d5d9eebbb8dd69041ea2af5aa0310d17e4be7f5eecc59b6b4995a8e0c46747f748da3be26f77edca5aefb220ab80a7
SHA1 hash: d0229347c777a459ecc0c32bbce717ac10185cea
MD5 hash: b872b4afe77c0b4e362cc5ef3343b072
humanhash: bluebird-eleven-alaska-timing
File name:tapeworm.asc
Download: download sample
Signature Quakbot
File size:598'016 bytes
First seen:2022-10-19 10:12:20 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash f599b6f39c4199efc636d6c6956ca27a (5 x Quakbot)
ssdeep 12288:HZBs6eUwpkdFC7dStewcZWOcRSrXugaJJkPcpF:5+UwWFew2Dgk
Threatray 1'552 similar samples on MalwareBazaar
TLSH T1DCD4BF0095851DF1D18ED97FB97FEC9AC62922B5FF126B8B35488258B5E23C1DF0270A
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter pr0xylife
Tags:dll obama214 Qakbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
257
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Launching a process
Searching for synchronization primitives
Modifying an executable file
Creating a window
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
64 / 100
Signature
Allocates memory in foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 725990 Sample: tapeworm.asc.dll Startdate: 19/10/2022 Architecture: WINDOWS Score: 64 32 Machine Learning detection for sample 2->32 34 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->34 8 loaddll32.exe 1 2->8         started        process3 signatures4 44 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 8->44 46 Writes to foreign memory regions 8->46 48 Allocates memory in foreign processes 8->48 50 Maps a DLL or memory area into another process 8->50 11 rundll32.exe 8->11         started        14 cmd.exe 1 8->14         started        16 regsvr32.exe 8->16         started        18 2 other processes 8->18 process5 signatures6 52 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 11->52 54 Writes to foreign memory regions 11->54 56 Allocates memory in foreign processes 11->56 20 wermgr.exe 8 1 11->20         started        23 rundll32.exe 14->23         started        58 Maps a DLL or memory area into another process 16->58 26 wermgr.exe 16->26         started        process7 file8 30 C:\Users\user\Desktop\tapeworm.asc.dll, PE32 20->30 dropped 36 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 23->36 38 Writes to foreign memory regions 23->38 40 Allocates memory in foreign processes 23->40 42 Maps a DLL or memory area into another process 23->42 28 wermgr.exe 23->28         started        signatures9 process10
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2022-10-19 11:15:39 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:obama214 campaign:1666019778 banker stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Qakbot/Qbot
Malware Config
C2 Extraction:
105.96.221.136:443
37.37.80.2:3389
105.154.56.232:995
41.107.116.19:443
105.103.52.189:443
159.192.204.135:443
41.107.58.251:443
177.152.65.142:443
102.47.218.41:443
176.45.35.243:443
70.173.248.13:443
102.159.77.134:995
220.123.29.76:443
82.12.196.197:443
103.156.237.71:443
149.126.159.254:443
176.44.119.153:443
181.56.171.3:995
190.205.229.67:2222
151.251.50.117:443
163.182.177.80:443
72.21.109.1:443
41.101.92.195:443
190.193.180.228:443
190.204.112.207:2222
41.97.56.102:443
41.69.209.76:443
190.78.89.157:993
206.1.216.19:2087
85.242.200.96:443
41.251.219.50:443
105.111.141.73:443
41.103.64.82:443
190.39.218.17:443
84.220.13.28:443
190.100.149.122:995
197.1.19.60:443
196.64.70.216:443
196.89.213.40:995
181.168.145.94:443
187.101.200.186:995
41.105.245.174:443
179.25.144.177:995
78.179.135.247:443
94.52.127.44:443
186.18.210.16:443
102.158.215.180:443
78.183.238.79:443
197.1.50.150:443
42.189.32.186:80
167.58.235.5:443
14.54.83.15:443
187.198.8.241:443
71.239.12.136:443
112.70.141.221:443
37.245.136.135:2222
88.232.10.69:443
41.98.250.65:443
82.205.9.34:443
196.64.239.75:443
37.8.68.1:443
197.1.248.244:443
197.2.139.7:443
79.45.134.162:22
182.183.211.163:995
154.246.14.94:443
144.86.17.168:443
182.185.29.69:995
160.177.47.116:6881
181.197.41.173:443
160.248.194.147:443
85.109.221.97:443
125.25.77.249:995
1.20.185.138:443
91.171.72.214:32100
197.10.195.7:443
45.160.33.163:443
202.170.206.61:995
96.9.66.118:995
132.251.244.227:443
113.188.13.246:443
78.181.39.116:443
1.53.101.75:443
197.202.173.111:443
31.201.40.194:443
197.116.178.224:443
79.155.159.177:443
181.188.164.123:443
156.221.50.226:995
41.251.15.7:990
45.240.140.233:995
102.188.91.158:995
189.243.187.76:443
179.105.182.216:995
196.65.230.248:995
181.141.3.126:443
128.234.26.174:995
78.161.194.147:443
78.101.177.210:443
86.217.167.235:2222
Unpacked files
SH256 hash:
1d80f42feab51304ad3a065f001ac38bafde1c415e0d570459cff1e6a0b3ee8d
MD5 hash:
190ec61e2c41d3fced699b9b7384f738
SHA1 hash:
dca5becc339885f7707e08af9c369e56a8cad3af
SH256 hash:
a2d67767e615681d1cab8f64e490101108031a66ef0323801b9f3dea1d35ff73
MD5 hash:
dbd8c93dcecadd8500f0a097f9fa3151
SHA1 hash:
cd55f9b06a84673cbb5c64c7705f8623bbcbe7cd
Detections:
Qakbot win_qakbot_auto
SH256 hash:
82af67585343100b3f745739e09896f6b2068759ac2ce30a908d4b7bab7eb2aa
MD5 hash:
b872b4afe77c0b4e362cc5ef3343b072
SHA1 hash:
d0229347c777a459ecc0c32bbce717ac10185cea
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:QakBot
Author:kevoreilly
Description:QakBot Payload
Rule name:unpacked_qbot
Description:Detects unpacked or memory-dumped QBot samples
Rule name:win_qakbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.qakbot.
Rule name:win_qakbot_malped
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.qakbot.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments