MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8b59e2de999068c78d352cb591dbae7e4495ce989615eb35607475648356ef11. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments

SHA256 hash: 8b59e2de999068c78d352cb591dbae7e4495ce989615eb35607475648356ef11
SHA3-384 hash: c262b4acc99efdced591015711eb2510dc08d91567a857e422693d01c772e4242fc70284dc69b80846048d586d3a4d90
SHA1 hash: 224443e988d68a3e020d539854f609b32c5067e7
MD5 hash: 3af4a4a28dafbb10a6637e59059015fe
humanhash: fix-robin-ten-cup
File name:whatAt.db
Download: download sample
Signature Quakbot
File size:379'392 bytes
First seen:2022-09-15 12:49:42 UTC
Last seen:2022-09-15 14:24:08 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash df144ca6f4d86bd687145d0f4cf05516 (4 x Quakbot)
ssdeep 6144:0W94f4+mWoAwI55fMC/sLv2S2UBNlAzm+LNq6mpPh9HTk3upTfCUp:D4w1AwSpZ1S2kNWzmjDh9zk3gD
Threatray 1'375 similar samples on MalwareBazaar
TLSH T12D84E140A4D1C4B7E47D19BB606AFB7B0D2D56313838CC6FD7241AA04E713D6B126E2E
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter pr0xylife
Tags:dll Quakbot

Intelligence


File Origin
# of uploads :
3
# of downloads :
295
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Launching a process
Modifying an executable file
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Allocates memory in foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Qbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 703451 Sample: whatAt.db.dll Startdate: 15/09/2022 Architecture: WINDOWS Score: 92 40 Malicious sample detected (through community Yara rule) 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 Yara detected Qbot 2->44 46 2 other signatures 2->46 8 loaddll32.exe 1 2->8         started        process3 signatures4 48 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 8->48 50 Injects code into the Windows Explorer (explorer.exe) 8->50 52 Writes to foreign memory regions 8->52 54 2 other signatures 8->54 11 rundll32.exe 8->11         started        14 regsvr32.exe 8->14         started        16 rundll32.exe 8->16         started        18 3 other processes 8->18 process5 signatures6 56 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 11->56 58 Injects code into the Windows Explorer (explorer.exe) 11->58 60 Writes to foreign memory regions 11->60 20 explorer.exe 8 1 11->20         started        62 Allocates memory in foreign processes 14->62 64 Maps a DLL or memory area into another process 14->64 23 explorer.exe 14->23         started        25 WerFault.exe 9 16->25         started        28 WerFault.exe 16->28         started        30 rundll32.exe 18->30         started        32 WerFault.exe 23 9 18->32         started        process7 dnsIp8 36 C:\Users\user\Desktop\whatAt.db.dll, PE32 20->36 dropped 38 192.168.2.1 unknown unknown 25->38 34 WerFault.exe 2 9 30->34         started        file9 process10
Threat name:
Win32.Trojan.BotX
Status:
Malicious
First seen:
2022-09-15 10:18:47 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
12 of 40 (30.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:bb campaign:1663053540 banker stealer trojan
Behaviour
Creates scheduled task(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Loads dropped DLL
Qakbot/Qbot
Malware Config
C2 Extraction:
194.49.79.231:443
193.3.19.37:443
99.232.140.205:2222
47.146.182.110:443
84.38.133.191:443
191.97.234.238:995
37.210.148.30:995
64.207.215.69:443
200.161.62.126:32101
88.245.103.132:2222
86.98.156.176:993
175.110.231.67:443
78.100.254.17:2222
191.84.204.214:995
123.240.131.1:443
197.94.210.133:443
196.92.172.24:8443
186.50.245.74:995
70.51.132.197:2222
100.1.5.250:995
179.111.111.88:32101
151.234.97.239:990
78.182.113.80:443
91.116.160.252:443
41.96.152.196:443
105.99.217.147:995
105.109.138.89:443
81.131.161.131:2078
41.97.64.224:443
134.35.11.110:443
102.188.100.131:995
41.248.89.135:443
81.214.220.237:443
113.170.216.154:443
187.205.222.100:443
95.136.41.50:443
190.158.58.236:443
105.98.130.85:443
190.44.40.48:995
105.197.192.21:995
181.127.138.30:443
167.60.82.242:995
196.112.34.71:443
88.251.38.53:443
68.224.229.42:443
37.37.206.87:995
37.76.197.124:443
188.157.6.170:443
109.158.159.179:993
68.50.190.55:443
181.111.20.201:443
31.166.116.171:443
84.238.253.171:443
197.49.50.44:443
169.159.95.135:2222
45.160.124.211:995
113.22.102.155:443
211.248.176.4:443
186.167.249.206:443
85.114.99.34:443
85.98.206.165:995
139.195.132.210:2222
182.213.208.5:443
201.177.163.176:443
45.183.234.180:443
98.180.234.228:443
184.82.110.50:995
179.24.245.193:995
94.99.110.157:995
181.56.125.32:443
119.42.124.18:443
181.231.229.133:443
2.89.78.130:993
70.81.121.237:2222
181.81.116.144:443
197.11.128.156:443
41.142.132.190:443
105.111.60.60:995
154.238.151.197:995
156.219.49.22:995
154.181.136.133:995
179.223.89.154:995
102.101.231.141:443
220.116.250.45:443
138.0.114.166:443
62.114.193.186:995
85.98.46.114:443
88.244.84.195:443
184.99.123.118:443
186.120.58.88:443
46.186.216.41:32100
156.213.107.29:995
27.73.215.46:32102
68.151.196.147:995
181.59.3.118:443
68.129.232.158:443
45.241.140.181:995
212.156.51.194:443
87.75.195.211:443
1.10.253.207:443
87.220.229.164:2222
109.200.165.82:443
41.105.197.244:443
190.59.247.136:995
219.69.103.199:443
61.105.45.244:443
105.105.104.0:443
169.1.47.111:443
210.195.18.76:2222
125.26.54.57:995
88.246.170.2:443
95.10.13.82:443
171.248.157.128:995
118.68.220.199:443
139.195.63.45:2222
118.216.99.232:443
181.80.133.202:443
102.40.236.32:995
46.116.229.16:443
61.70.29.53:443
179.108.32.195:443
171.238.230.59:443
81.56.22.251:995
31.32.180.179:443
197.204.209.38:443
186.64.87.202:443
85.139.203.42:32101
120.150.218.241:995
173.189.167.21:995
24.139.72.117:443
104.34.212.7:32103
47.23.89.61:995
24.55.67.176:443
172.115.177.204:2222
217.165.77.134:995
24.178.196.158:2222
67.209.195.198:443
111.125.245.116:995
39.49.67.4:995
78.101.202.75:50010
37.34.253.233:443
217.165.77.134:443
46.107.48.202:443
70.46.220.114:443
63.143.92.99:995
93.48.80.198:995
179.158.103.236:443
47.180.172.159:443
47.23.89.61:993
Unpacked files
SH256 hash:
e1523108cf964d2d664ad838a6ab1903ae3c4414e1757807e434eb96c4b67763
MD5 hash:
ddae5182b3c5e351ae4549b9dfeabfee
SHA1 hash:
d420fd690ad5a16f818c31c285c5f7e163d8afc2
Detections:
win_qakbot_auto
SH256 hash:
8b59e2de999068c78d352cb591dbae7e4495ce989615eb35607475648356ef11
MD5 hash:
3af4a4a28dafbb10a6637e59059015fe
SHA1 hash:
224443e988d68a3e020d539854f609b32c5067e7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:QakBot
Author:kevoreilly
Description:QakBot Payload
Rule name:unpacked_qbot
Description:Detects unpacked or memory-dumped QBot samples
Rule name:win_qakbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.qakbot.
Rule name:win_qakbot_malped
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.qakbot.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments