MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9c3cfeccfffba1fe5b1b69a5784e3d2832a35aebd0998efb48877ae766708691. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 9c3cfeccfffba1fe5b1b69a5784e3d2832a35aebd0998efb48877ae766708691
SHA3-384 hash: d485434289b1fae14e9ee35f592d8b3d6e5c5b2999e9fe824ae983ceec1350ac575ed6db7259be31896e62c3b35612d2
SHA1 hash: e21be6605ac1a0b3416df5e266a20c5b9581f4c3
MD5 hash: feb4484f965d53e26a67141c97c3ca19
humanhash: sixteen-pip-burger-georgia
File name:8sdsfd2sd.exe
Download: download sample
Signature Quakbot
File size:666'950 bytes
First seen:2021-02-02 18:51:04 UTC
Last seen:2021-02-02 20:27:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 0451a14c6dd290039b64df1a7a79d43e (2 x BazaLoader, 1 x Quakbot)
ssdeep 6144:xKxqEDbq4lljdpR44G+inOczu3ERBQwOpKABQ:IVlzpRU7u3oBQwOG
Threatray 2 similar samples on MalwareBazaar
TLSH 3FE47D2476AA56EFFD5B847A76458255B4B37284432BEDFB41E0D7213A03BE00F3862D
Reporter ffforward
Tags:BazaLoader BazarBackdoor BazarCall BazarLoader kegtap

Code Signing Certificate

Organisation:GlobalSign Timestamping CA - G2
Issuer:GlobalSign Root CA
Algorithm:sha1WithRSAEncryption
Valid from:Apr 13 10:00:00 2011 GMT
Valid to:Jan 28 12:00:00 2028 GMT
Serial number: 0400000000012F4EE152D7
Intelligence: 12 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: C977923C771E1A66C925A2B6F501732E678DC9887AFE6BFAAC039D1D9A71F0EC
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
305
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9c3cfeccfffba1fe5b1b69a5784e3d2832a35aebd0998efb48877ae766708691.zip
Verdict:
No threats detected
Analysis date:
2021-02-02 19:14:42 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Sending a UDP request
Sending a custom TCP request
Creating a file in the %temp% directory
Creating a process from a recently created file
Deleting a recently created file
Connection attempt
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Wacatac
Status:
Malicious
First seen:
2021-02-02 18:52:07 UTC
File Type:
PE+ (Exe)
AV detection:
10 of 28 (35.71%)
Threat level:
  5/5
Result
Malware family:
bazarbackdoor
Score:
  10/10
Tags:
family:bazarbackdoor backdoor
Behaviour
Delays execution with timeout.exe
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
BazarBackdoor
Unpacked files
SH256 hash:
9c3cfeccfffba1fe5b1b69a5784e3d2832a35aebd0998efb48877ae766708691
MD5 hash:
feb4484f965d53e26a67141c97c3ca19
SHA1 hash:
e21be6605ac1a0b3416df5e266a20c5b9581f4c3
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Quakbot

Executable exe 9c3cfeccfffba1fe5b1b69a5784e3d2832a35aebd0998efb48877ae766708691

(this sample)

  
Delivery method
Distributed via web download

Comments