MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aeac401a979114462768e6af0ddd96e4784eeef08953884aca607fc000d229f3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments

SHA256 hash: aeac401a979114462768e6af0ddd96e4784eeef08953884aca607fc000d229f3
SHA3-384 hash: 0c3c3e67c5bf112a6312a02c17c2f08596235619cd2973d9a1c5a06254e1751c2582c821ba1b308b47783ef86c12ead7
SHA1 hash: c96dfb2a0f34dafb51a185463554d35c1cec1f21
MD5 hash: 832f78a5f5e70112385f95780036be93
humanhash: aspen-one-december-butter
File name:33333333
Download: download sample
Signature Quakbot
File size:2'726'928 bytes
First seen:2020-06-20 06:32:46 UTC
Last seen:2020-06-20 07:47:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f7d630e11e8fb2ccba2afc5785c24d66 (1 x Quakbot)
ssdeep 12288:jhuspT2wwLHqpVxTBfGjuLPvfoAdIiftn8:BpT2wwTefuuLPnbS
Threatray 424 similar samples on MalwareBazaar
TLSH 66C5F12BB5A0854FD626CD32C8F022B10955FFFE4236644B35A0794BB9F9DD68C50ACB
Reporter JAMESWT_WT
Tags:Qakbot Quakbot

Code Signing Certificate

Organisation:HFQAOBLCWSJIQHWAST
Issuer:HFQAOBLCWSJIQHWAST
Algorithm:sha1WithRSA
Valid from:Jun 19 14:35:34 2020 GMT
Valid to:Dec 31 23:59:59 2039 GMT
Serial number: 5DA297AE28D943BC4E5D71F671A3E983
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: DFAFAC456F0EE25EB131F10A5578DA13420D86A170A3587184E4F5F39D34F5EB
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
260
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-06-20 06:32:32 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
25 of 31 (80.65%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
evasion trojan banker stealer family:qakbot
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Modifies data under HKEY_USERS
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Creates scheduled task(s)
Windows security modification
Loads dropped DLL
Executes dropped EXE
Turns off Windows Defender SpyNet reporting
Qakbot/Qbot
Windows security bypass
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_qakbot
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_qakbot_a0
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_qakbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments