MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ab934f3725ad166b116da19a3f8d2215e0511f41efe1eff17d6cc30c5258726a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: ab934f3725ad166b116da19a3f8d2215e0511f41efe1eff17d6cc30c5258726a
SHA3-384 hash: e2d61ab141257be0eef325be8cf87ed4eda37057fb5b0abc6f5a249d989eefe5165d61c8766b3ea09a8c09ad52e10b8b
SHA1 hash: 19aa39286f4cff247e592c01c8991c485f7fe9b2
MD5 hash: 573796cc447144d98ecb0f8e10a61e7a
humanhash: quebec-seven-zulu-social
File name:ab934f3725ad166b116da19a3f8d2215e0511f41efe1eff17d6cc30c5258726a
Download: download sample
Signature QuakBot
File size:3'679'184 bytes
First seen:2020-11-06 11:23:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 69130f777fe76a2bf8f47f76eeade0ad (14 x QuakBot)
ssdeep 6144:SLeKM/GlkobrHZ3FWO8QSfZQBeCAm7hUsetSyc2SY:SLQon53FWO8QLeOscTY
Threatray 777 similar samples on MalwareBazaar
TLSH 4E06AC61B87640B4FC6D38BEE090587A611A9D054FF2C926622378F9EDF7C8861F748D
Reporter seifreed
Tags:Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
51
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-10-26 12:00:17 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
04b580a004ab9fce16d8ab3a9ac8ca293911382ffd86eb62a53f9f573a4991f7
MD5 hash:
187ae986680af35f62b5590cdadba40a
SHA1 hash:
b11707ca8525e9e8691288220360ae0f86877586
Detections:
win_qakbot_g0 win_qakbot_auto
SH256 hash:
ad8546d0f2c6ad8baf1a2ab56a241b1b1895e3a600c0f87fd02571cc5af1df66
MD5 hash:
0e1f3cb5475340570b9754c02ccd8810
SHA1 hash:
beb9c3c599381b044c70385d04e2e34ccbc232a4
Detections:
win_qakbot_auto
SH256 hash:
ab934f3725ad166b116da19a3f8d2215e0511f41efe1eff17d6cc30c5258726a
MD5 hash:
573796cc447144d98ecb0f8e10a61e7a
SHA1 hash:
19aa39286f4cff247e592c01c8991c485f7fe9b2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments