MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 91647ac947d5d5d3a0dc69e98070bfc2f9841d7839b579d69c524b02869a497f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 91647ac947d5d5d3a0dc69e98070bfc2f9841d7839b579d69c524b02869a497f
SHA3-384 hash: d5ff57b228fc511adc1379586a129b8fe0e8358242065ca8f1919a0946d4209838c4e44ac0e23b581c2c682ea8f6d7ec
SHA1 hash: caf89ae09f7435dcef4e886b056d020ee34925cf
MD5 hash: 6cc41d1ccd61ccdb3857703f83959aca
humanhash: spring-kilo-eight-pasta
File name:bemaji.exe
Download: download sample
Signature Quakbot
File size:138'752 bytes
First seen:2020-10-15 18:26:35 UTC
Last seen:2020-10-15 18:57:47 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 230884e31706a8cb31642f4af81b1fda (1 x Quakbot, 1 x ArkeiStealer)
ssdeep 3072:2WbX0LE5GA7Aq/7F+/5d5UhaFKeH/f+T43ZSCXiR6xc:zT0LE5GAkM7F+/Gh4Kk/f+T4pJFxc
Threatray 610 similar samples on MalwareBazaar
TLSH CBD39D1175D2C4B2C6962A315465DB611FBFFCB29B7002CB3B982A3E9F342D04A35B5B
Reporter James_inthe_box
Tags:exe Quakbot

Intelligence


File Origin
# of uploads :
2
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Sending a UDP request
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP POST request
Sending an HTTP GET request
Creating a process from a recently created file
Creating a window
Launching a process
Searching for the window
Creating a process with a hidden window
Reading critical registry keys
Creating a file
Creating a file in the %AppData% subdirectories
Running batch commands
Setting browser functions hooks
Unauthorized injection to a system process
Deleting of the original file
Enabling autorun by creating a file
Unauthorized injection to a browser process
Result
Threat name:
Qbot SmokeLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Benign windows process drops PE files
Binary contains a suspicious time stamp
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect virtual machines (IN, VMware)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
May use the Tor software to hide its network traffic
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Renames NTDLL to bypass HIPS
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Qbot
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 298918 Sample: bemaji.exe Startdate: 15/10/2020 Architecture: WINDOWS Score: 100 73 Multi AV Scanner detection for submitted file 2->73 75 Yara detected SmokeLoader 2->75 77 Yara detected Qbot 2->77 79 5 other signatures 2->79 9 bemaji.exe 1 2->9         started        12 dgvavbb 1 2->12         started        15 rkfxbdu.exe 2->15         started        18 2989.exe 2->18         started        process3 dnsIp4 97 Detected unpacking (changes PE section rights) 9->97 99 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 9->99 101 Renames NTDLL to bypass HIPS 9->101 111 2 other signatures 9->111 20 explorer.exe 7 9->20 injected 61 C:\Users\user\AppData\Local\Temp\554B.tmp, PE32 12->61 dropped 103 Multi AV Scanner detection for dropped file 12->103 105 Machine Learning detection for dropped file 12->105 107 Maps a DLL or memory area into another process 12->107 69 dasd13d.com 142.4.7.183, 4035, 49765 UNIFIEDLAYER-AS-1US United States 15->69 109 Detected unpacking (overwrites its own PE header) 15->109 file5 signatures6 process7 dnsIp8 63 sm15sdsd.xyz 85.217.171.55, 49760, 49763, 80 BELCLOUDBG Cyprus 20->63 65 91.92.128.201, 49762, 80 BELCLOUDBG Cyprus 20->65 67 ptc-latam.com 217.160.0.225, 49761, 80 ONEANDONE-ASBrauerstrasse48DE Germany 20->67 49 C:\Users\user\AppData\Roaming\dgvavbb, PE32 20->49 dropped 51 C:\Users\user\AppData\Local\Temp\2989.exe, PE32 20->51 dropped 53 C:\Users\user\AppData\Local\Temp\20ED.exe, PE32 20->53 dropped 55 C:\Users\user\...\dgvavbb:Zone.Identifier, ASCII 20->55 dropped 89 System process connects to network (likely due to code injection or exploit) 20->89 91 Benign windows process drops PE files 20->91 93 Injects code into the Windows Explorer (explorer.exe) 20->93 95 3 other signatures 20->95 25 2989.exe 3 20->25         started        29 20ED.exe 3 20->29         started        31 explorer.exe 8 20->31         started        34 14 other processes 20->34 file9 signatures10 process11 dnsIp12 57 C:\Users\user\AppData\...\aphiamte.exe, PE32 25->57 dropped 113 Antivirus detection for dropped file 25->113 115 Detected unpacking (changes PE section rights) 25->115 117 Detected unpacking (overwrites its own PE header) 25->117 133 2 other signatures 25->133 36 aphiamte.exe 25->36         started        39 schtasks.exe 25->39         started        41 2989.exe 25->41         started        59 C:\ProgramData\aplwhqe\rkfxbdu.exe, PE32 29->59 dropped 119 Multi AV Scanner detection for dropped file 29->119 121 Machine Learning detection for dropped file 29->121 123 Tries to detect virtualization through RDTSC time measurements 29->123 71 sm15sdsd.xyz 31->71 125 System process connects to network (likely due to code injection or exploit) 31->125 127 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 31->127 129 Tries to steal Mail credentials (via file access) 31->129 131 Tries to harvest and steal browser information (history, passwords, etc) 31->131 file13 signatures14 process15 signatures16 81 Antivirus detection for dropped file 36->81 83 Detected unpacking (changes PE section rights) 36->83 85 Detected unpacking (overwrites its own PE header) 36->85 87 5 other signatures 36->87 43 aphiamte.exe 36->43         started        45 explorer.exe 36->45         started        47 conhost.exe 39->47         started        process17
Threat name:
Win32.Trojan.Zenpak
Status:
Malicious
First seen:
2020-10-15 18:26:29 UTC
File Type:
PE (Exe)
Extracted files:
9
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
spyware trojan backdoor family:smokeloader banker stealer family:qakbot
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Deletes itself
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
SmokeLoader
Qakbot/Qbot
Malware Config
C2 Extraction:
http://sm15sdsd.xyz/
Unpacked files
SH256 hash:
91647ac947d5d5d3a0dc69e98070bfc2f9841d7839b579d69c524b02869a497f
MD5 hash:
6cc41d1ccd61ccdb3857703f83959aca
SHA1 hash:
caf89ae09f7435dcef4e886b056d020ee34925cf
SH256 hash:
73e2b8be4f25fc6df8f93c4be79a69d81a9d955ccde5646c90c21b1a3a1503bd
MD5 hash:
856320c797085b2a29f0bb151406230f
SHA1 hash:
5b982d9e42e8107fbdee495172af35a831983cde
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments