MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a5345cb20dbe087faafdda55d9abf2acb54168524b2d5ab635718e2a6032b47e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: a5345cb20dbe087faafdda55d9abf2acb54168524b2d5ab635718e2a6032b47e
SHA3-384 hash: 2aac774b6acafe9c9e2ecf47e055a3a29c79eeca06eab7cf1892054d86222d9bcd1c181da02a3188f593714254f1623a
SHA1 hash: 0b49e3740ab8e8703725eec632557ea5fa260ae6
MD5 hash: acbdd277614f899cf8cb6fb0bae0852f
humanhash: robin-white-fillet-leopard
File name:a5345cb20dbe087faafdda55d9abf2acb54168524b2d5ab635718e2a6032b47e
Download: download sample
Signature QuakBot
File size:1'084'416 bytes
First seen:2020-11-12 13:56:41 UTC
Last seen:2024-07-24 19:55:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c1e35a855d20d45e9c84f5bd029dd388 (154 x Quakbot)
ssdeep 6144:SRradp/pASxIARD83dTkFICdy2Ms2NbDWmZ31Ey7Egfn5ktjKkCGInR+HlZzmU6s:SRE2SxhORxn2McyuKLUUhulLhJ9FCe
TLSH EC3522D7F9BC8471CAED297F8993123C968A85E85D05D10B0778A5ADBDF3200FE9244B
Reporter seifreed
Tags:Quakbot

Intelligence


File Origin
# of uploads :
2
# of downloads :
53
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Forced shutdown of a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-11-12 13:57:30 UTC
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
a5345cb20dbe087faafdda55d9abf2acb54168524b2d5ab635718e2a6032b47e
MD5 hash:
acbdd277614f899cf8cb6fb0bae0852f
SHA1 hash:
0b49e3740ab8e8703725eec632557ea5fa260ae6
SH256 hash:
4522c59481af251679147bc6ae082312e91dbe16dc4d5a7724356c219bee8448
MD5 hash:
eda788cfa3ba43ccecf14c57d947a5ef
SHA1 hash:
f84b43e68c01cee221894d89f85ecacf8b700f66
Detections:
win_qakbot_g0 win_qakbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments