MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a6ee266834675fea92b4d1ac2317e79e16dd33939d883a2ba5af2bba3db9872f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 4


Intelligence 4 IOCs YARA 3 File information Comments

SHA256 hash: a6ee266834675fea92b4d1ac2317e79e16dd33939d883a2ba5af2bba3db9872f
SHA3-384 hash: a1d67e596a032aaedd4655c6fb418630962d4bb8731d79f44172d16678a28e744e98784ab15e664408e0cbd0ed87be95
SHA1 hash: d1e6e2b2dfe19364618f764ffafb35125b036501
MD5 hash: 530e15ca5faab0e866f5b9324992c23c
humanhash: timing-black-kansas-quiet
File name:Claim#2225.html
Download: download sample
Signature Quakbot
File size:1'156'536 bytes
First seen:2022-12-02 16:09:28 UTC
Last seen:Never
File type: html
MIME type:text/html
ssdeep 24576:yGELSQ9jGMmZSkcgK/GV6iDmXBPqqK1EqvDV:RqSQZv6p0b2ZV
TLSH T1D7350278DF18CFA94FE01A1D14EE1A1A6FB46E578057D986BE9FBC0B4B5AC01011B6CC
Reporter pr0xylife
Tags:html obama225 Qakbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
157
Origin country :
RU RU
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
qbot
Result
Verdict:
UNKNOWN
Details
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Result
Threat name:
HtmlDropper
Detection:
malicious
Classification:
troj
Score:
52 / 100
Signature
Uses 7zip to decompress a password protected archive
Yara detected Html Dropper
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 759357 Sample: Claim#2225.html Startdate: 02/12/2022 Architecture: WINDOWS Score: 52 35 Yara detected Html Dropper 2->35 8 chrome.exe 18 8 2->8         started        11 chrome.exe 2->11         started        process3 dnsIp4 29 192.168.2.1 unknown unknown 8->29 31 192.168.2.3 unknown unknown 8->31 33 239.255.255.250 unknown Reserved 8->33 13 unarchiver.exe 4 8->13         started        16 chrome.exe 8->16         started        process5 dnsIp6 37 Uses 7zip to decompress a password protected archive 13->37 19 7za.exe 2 13->19         started        23 clients.l.google.com 142.250.185.142, 443, 49715 GOOGLEUS United States 16->23 25 www.google.com 142.250.74.196, 443, 49719, 49763 GOOGLEUS United States 16->25 27 3 other IPs or domains 16->27 signatures7 process8 process9 21 conhost.exe 19->21         started       
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:MAL_QBot_HTML_Smuggling_Indicators_Oct22_1
Author:Florian Roth
Description:Detects double encoded PKZIP headers as seen in HTML files used by QBot
Reference:https://twitter.com/ankit_anubhav/status/1578257383133876225?s=20&t=Bu3CCJCzImpTGOQX_KGsdA
Rule name:QBOT_HTMLSmuggling_a
Author:Ankit Anubhav - ankitanubhav.info
Description:Detects QBOT HTML smuggling variants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments