MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 936762ac61ecd3ed975e97c2f8f328f62ecbc4ee2ef79c82943226a911751cc1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 936762ac61ecd3ed975e97c2f8f328f62ecbc4ee2ef79c82943226a911751cc1
SHA3-384 hash: b5de247df7b0d634245454fb5da5b098d6ca7f5810d78294a46ecfa8c4952ca91aae5909c727a8042d6b6346a5bab5ac
SHA1 hash: 3faf5cd7a3e3e9787dda9517992aa3227b02cae8
MD5 hash: 7d1c096cba6d86a3d75727af5fa28c62
humanhash: michigan-floor-arizona-mockingbird
File name:ComplianceRep-840559179-Apr-18.zip
Download: download sample
Signature Quakbot
File size:1'416'402 bytes
First seen:2022-04-19 02:23:28 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 24576:SUOpY0o6S7/ctm6Uc5Vq2JIDkqSgCJ5Iw1URhRW5D2+yAoUmqdn6wY+nebrOEMW2:SnpvSrpMnq4skngCJWw1URhEp2+zmGnx
TLSH T1846533C0AFC3D666B98439BEA4C8EAFC81A32747E6660D7B053F0585715C1F2E8D60B5
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter malware_traffic
Tags:excel obama176 Qakbot qbot Quakbot xlsb zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
368
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
OOXML Excel File with Excel4Macro
Payload URLs
URL
File name
5.254.118.198
sharedStrings.bin
Document image
Document image
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
dridex macros-on-open regsvr32 regsvr32.exe
Threat name:
Document-Office.Backdoor.Quakbot
Status:
Malicious
First seen:
2022-04-19 02:24:07 UTC
File Type:
Binary (Archive)
Extracted files:
35
AV detection:
7 of 42 (16.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Process spawned unexpected child process
Malware Config
Dropper Extraction:
http://146.70.87.163/44666,6175321759.dat
http://5.254.118.198/44666,6175321759.dat
http://91.194.11.15/44666,6175321759.dat
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments