MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bec5a928b9c8302b548e7dc833fb81e0a257144872551644b0a140a54a98cfb5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: bec5a928b9c8302b548e7dc833fb81e0a257144872551644b0a140a54a98cfb5
SHA3-384 hash: 4d0c3ba4bda17946ab9cab18c5d8efd2204e71b8a109a427b61e312c8a8eaaa7f919f579de9a7e08738bc0e91643bf50
SHA1 hash: d77309cb8bcb45ac6cf1c84f16154e0a7179432c
MD5 hash: 78e63590a167ede50f6cd4dee0462ae3
humanhash: mockingbird-single-tennis-helium
File name:SecuriteInfo.com.BScope.Trojan.Cobalt.2128
Download: download sample
Signature QuakBot
File size:1'097'168 bytes
First seen:2020-11-12 22:45:46 UTC
Last seen:2024-07-24 21:02:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e6b26600fceb7aaa60a5492a3d8d235d (1 x QuakBot)
ssdeep 12288:O1qflDDoYel20NNHCizXv+Omjt7Wq7X6EQ2XbhP5:O100k0NNHCgCt7RNbh5
Threatray 1'250 similar samples on MalwareBazaar
TLSH AD350117F2E34E9BD853447D69E285B98032EFEDD32BA4332D48F5DA31E62C4812E605
Reporter SecuriteInfoCom
Tags:Quakbot

Intelligence


File Origin
# of uploads :
2
# of downloads :
172
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.PinkSbot
Status:
Malicious
First seen:
2020-11-13 00:27:00 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
bec5a928b9c8302b548e7dc833fb81e0a257144872551644b0a140a54a98cfb5
MD5 hash:
78e63590a167ede50f6cd4dee0462ae3
SHA1 hash:
d77309cb8bcb45ac6cf1c84f16154e0a7179432c
SH256 hash:
3e49de3ea717441f4cec474f6dab9f540e5d4495c53ad0dc494d5ccf01d9577a
MD5 hash:
7c9ec0935dd39f169f2a5ef2a8e2af76
SHA1 hash:
ad6e84696fa30fdfb4d2cf67b1410e3a0a89b043
Detections:
win_qakbot_g0 win_qakbot_auto
SH256 hash:
4692f0a62f714d0acb7a58b0f52e96844d75e93980e87a3c959eb6773d734e0d
MD5 hash:
34b6b8e9f422bd64ddac18fb466cbdfa
SHA1 hash:
fb0f92fcab48eb274191d734fc557158c0ebc8df
Detections:
win_qakbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments