MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 89a1fc475c266fe386fa517eb51d7c00bcd4b0262bba095d468c5f4da51f312c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 89a1fc475c266fe386fa517eb51d7c00bcd4b0262bba095d468c5f4da51f312c
SHA3-384 hash: 23cf6ad29b90c8c9b5bb328c537f2ab0e4652d27e0c882f8688ba07e2c0d937bac7e2c773b3f79e07c59e8564f01d0a7
SHA1 hash: 1cd70e3d55be049b2043b78a145cadec39d2fae5
MD5 hash: c7796954e945ea93c73d26a3030372f1
humanhash: ink-may-eight-magazine
File name:89a1fc475c266fe386fa517eb51d7c00bcd4b0262bba095d468c5f4da51f312c
Download: download sample
Signature Quakbot
File size:1'432'579 bytes
First seen:2022-04-06 19:50:50 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash bf76170fdd1a32d24bc7fb416675e801 (1 x Quakbot)
ssdeep 24576:KDeI7ElHgumRVAAKHr5X2U1v4usbARb9smALTYSKfArYiM/eOR2R15bJFcyySCIC:KCI
Threatray 426 similar samples on MalwareBazaar
TLSH T1B565AFB876046CDAE66F427BDD96ACDD13B626738AC7A4CD806577C30963372FE02805
Reporter malwarelabnet
Tags:AA dll Qakbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
286
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Сreating synchronization primitives
Launching a process
Searching for synchronization primitives
Creating a window
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:aa campaign:1649247784 banker stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Qakbot/Qbot
Malware Config
C2 Extraction:
181.208.248.227:443
176.205.119.81:2078
92.177.45.46:2078
70.46.220.114:443
39.49.81.128:995
91.177.173.10:995
31.56.252.29:32103
117.248.109.38:21
197.87.144.193:443
172.114.160.81:995
102.159.243.153:443
144.136.35.102:2222
45.241.214.192:995
143.0.34.185:443
67.209.195.198:443
24.178.196.158:2222
217.128.122.65:2222
89.211.187.3:2222
41.230.62.211:993
179.158.105.44:443
187.102.135.142:2222
174.69.215.101:443
209.197.176.40:995
120.150.218.241:995
63.143.92.99:995
82.152.39.39:443
42.235.146.7:2222
92.154.9.41:2222
31.48.166.122:2078
41.107.251.69:443
75.113.214.234:2222
86.98.208.214:2222
1.161.121.58:443
190.73.3.148:2222
76.69.155.202:2222
196.203.37.215:80
83.110.157.57:2222
85.246.82.244:443
96.29.208.97:443
74.15.2.252:2222
76.70.9.169:2222
108.60.213.141:443
75.99.168.194:443
86.195.158.178:2222
72.76.94.99:443
71.74.12.34:443
191.17.223.93:32101
103.230.180.119:443
103.139.243.207:990
38.70.253.226:2222
96.21.251.127:2222
140.82.49.12:443
5.95.58.211:2087
31.215.185.114:2222
182.191.92.203:995
176.67.56.94:443
39.44.144.159:995
197.162.118.178:993
37.210.238.79:61202
203.122.46.130:443
148.64.96.100:443
47.180.172.159:443
47.23.89.62:995
181.118.183.98:443
76.169.147.192:32103
172.115.177.204:2222
46.107.48.202:443
105.226.83.196:995
93.48.80.198:995
103.107.113.120:443
24.43.99.75:443
80.11.74.81:2222
102.140.71.72:443
41.38.167.179:995
207.170.238.231:443
66.98.42.102:443
83.110.85.209:443
75.99.168.194:61201
45.9.20.200:443
173.174.216.62:443
47.180.172.159:50010
83.110.75.97:2222
47.23.89.62:993
103.116.178.85:995
113.11.89.165:995
187.207.48.194:61202
140.82.63.183:443
144.202.2.175:995
149.28.238.199:995
45.76.167.26:443
45.63.1.12:443
144.202.2.175:443
140.82.63.183:995
144.202.3.39:995
149.28.238.199:443
45.63.1.12:995
144.202.3.39:443
45.76.167.26:995
32.221.224.140:995
31.35.28.29:443
176.88.238.122:995
71.13.93.154:2222
81.215.196.174:443
78.161.215.162:443
83.110.85.209:995
202.134.152.2:2222
103.88.226.30:443
109.228.220.196:443
41.228.22.180:443
2.50.137.197:443
1.161.121.58:995
120.61.1.185:443
175.145.235.37:443
86.98.156.250:993
75.188.35.168:443
39.52.34.138:995
94.36.195.250:2222
58.105.167.36:50000
41.84.232.168:995
208.107.221.224:443
121.74.178.16:995
119.158.126.69:995
173.21.10.71:2222
76.25.142.196:443
201.124.1.172:443
191.99.191.28:443
73.151.236.31:443
181.62.0.59:443
72.12.115.90:22
201.145.189.252:443
5.32.41.45:443
37.34.253.233:443
143.0.219.6:995
40.134.246.185:995
72.252.201.34:995
102.182.232.3:995
70.51.134.168:2222
189.178.44.144:22
190.252.242.69:443
24.55.67.176:443
201.211.64.196:2222
90.120.65.153:2078
45.46.53.140:2222
70.57.207.83:443
109.12.111.14:443
98.22.246.169:443
47.156.191.217:443
72.252.201.34:990
31.215.185.114:1194
191.112.29.181:443
Unpacked files
SH256 hash:
89a1fc475c266fe386fa517eb51d7c00bcd4b0262bba095d468c5f4da51f312c
MD5 hash:
c7796954e945ea93c73d26a3030372f1
SHA1 hash:
1cd70e3d55be049b2043b78a145cadec39d2fae5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments