MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 acaf0b60acb73370b7ebf96ecbfd947da545dda84413333ca918cb46cca87f7e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: acaf0b60acb73370b7ebf96ecbfd947da545dda84413333ca918cb46cca87f7e
SHA3-384 hash: 558ce475db7fb8a4e35cd6384233028ecadef6bbc2b5e498f3254823b6d344d7ec1d2bc9e4c7bf7bc41bedc0560ac65c
SHA1 hash: fbefcf270c61e7108d1e5b6124d299c741ea6acf
MD5 hash: 056ae65f93e17decca62525ac9067970
humanhash: december-berlin-sodium-happy
File name:acaf0b60acb73370b7ebf96ecbfd947da545dda84413333ca918cb46cca87f7e.dll
Download: download sample
File size:261'592 bytes
First seen:2020-11-25 17:24:47 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash fcb7e66723aeaab780b1c2b44639282c (1 x Quakbot)
ssdeep 3072:z3BNzcIx2gLs5VVnvQYyLTUQHPH3MkKiXy4o+4z774L4yFpeQjLrmzht3WaM0z:zfXgB9yLTUQvH3nKiXtozvYpewrkRMQ
Threatray 1'330 similar samples on MalwareBazaar
TLSH C744AF79BA12DC12E6682BB062C36FD81E879AD93510510F59F15F9CBEEA3847C13BC4
Reporter JAMESWT_WT
Tags:dll Qakbot qbot Quakbot signed Školab s.r.o.

Code Signing Certificate

Organisation:
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Nov 11 00:00:00 2020 GMT
Valid to:Nov 11 23:59:59 2021 GMT
Serial number: B8B58B6CFE395E338F3476D121E78139
Intelligence: 9 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: A3E4C97FE15C32445F1C603421B464D74A7FBE6DB23ED994AD7EBF17E77DC01A
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the Windows subdirectories
Launching a process
Modifying an executable file
Creating a process with a hidden window
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.QBot
Status:
Malicious
First seen:
2020-11-25 17:24:13 UTC
File Type:
PE (Dll)
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Suspicious use of AdjustPrivilegeToken
Program crash
Loads dropped DLL
Unpacked files
SH256 hash:
acaf0b60acb73370b7ebf96ecbfd947da545dda84413333ca918cb46cca87f7e
MD5 hash:
056ae65f93e17decca62525ac9067970
SHA1 hash:
fbefcf270c61e7108d1e5b6124d299c741ea6acf
SH256 hash:
2f90d572b1d449a524086d7f667183d3f65652ac255890e0e6b6a45b5462ae71
MD5 hash:
917f657d8a3dc25dc5b8219511624fbb
SHA1 hash:
32363973a8d01bfcf8d844ef37ca350d4d3b206c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments