MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c053795483b5ddb0176a84998a8907fa1997af0e0376275ebf34655f10b174e7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Quakbot
Vendor detections: 11
| SHA256 hash: | c053795483b5ddb0176a84998a8907fa1997af0e0376275ebf34655f10b174e7 |
|---|---|
| SHA3-384 hash: | b1ff9047b5d8a3051ddc7ab712d036f4e24dca547ff3afbfd4a10b42ea39fc6348d098115f181fcce901b834f984dab6 |
| SHA1 hash: | 1d8df70dbcda228394786454f86681211139729f |
| MD5 hash: | 8043b539a663ad49d50de454019c247f |
| humanhash: | uncle-north-cat-march |
| File name: | n3 |
| Download: | download sample |
| Signature | Quakbot |
| File size: | 1'153'585 bytes |
| First seen: | 2021-11-29 13:51:22 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 5d5d23d985af6616064100c4bb429c6f (1 x Quakbot) |
| ssdeep | 12288:bmBYAOgAXHssei9WzD2GzkJGNx/3uOTmv0R7E5:CYAOgAXHWn2GzkAx/+OTmsRE |
| Threatray | 390 similar samples on MalwareBazaar |
| TLSH | T1CC357DC1FB23EE07F7A0C43D90367FA54DDD30AB1B92A4F8B86C65E5AE8D260144A547 |
| Reporter | Anonymous |
| Tags: | exe Quakbot |
Intelligence
File Origin
# of uploads :
1
# of downloads :
145
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
n3
Verdict:
No threats detected
Analysis date:
2021-11-29 16:59:51 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
DNS request
Сreating synchronization primitives
Launching a process
Modifying an executable file
Searching for synchronization primitives
Creating a process with a hidden window
Creating a window
Sending a custom TCP request
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
0/10
Tags:
n/a
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
monero overlay
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Qakbot
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
72 / 100
Signature
Allocates memory in foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.BotX
Status:
Malicious
First seen:
2021-11-29 13:52:15 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
19 of 28 (67.86%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
qakbot
Similar samples:
+ 380 additional samples on MalwareBazaar
Result
Malware family:
qakbot
Score:
10/10
Tags:
family:qakbot botnet:tr campaign:1637746295 banker evasion stealer trojan
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Creates scheduled task(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Loads dropped DLL
Qakbot/Qbot
Windows security bypass
Malware Config
C2 Extraction:
5.193.134.177:995
140.82.49.12:443
120.150.218.241:995
39.49.95.46:995
117.198.148.163:443
111.250.48.162:443
105.198.236.99:995
117.248.109.38:21
103.142.10.177:443
123.252.190.14:443
89.101.97.139:443
78.191.52.30:995
39.33.218.78:995
207.246.112.221:443
207.246.112.221:995
102.65.38.57:443
194.36.28.26:443
93.48.80.198:995
218.101.110.3:995
81.250.153.227:2222
216.238.71.31:443
89.137.52.44:443
136.232.34.70:443
173.21.10.71:2222
41.228.22.180:443
136.143.11.232:443
71.74.12.34:443
76.25.142.196:443
103.116.178.85:993
197.89.108.222:443
75.169.58.229:32100
67.165.206.193:993
73.151.236.31:443
189.135.61.226:443
176.63.117.1:22
94.60.254.81:443
200.127.27.220:465
189.175.54.178:80
100.1.119.41:443
189.147.225.12:443
50.194.160.233:443
50.194.160.233:32100
24.229.150.54:995
24.55.112.61:443
24.139.72.117:443
109.12.111.14:443
45.46.53.140:2222
2.222.167.138:443
86.123.105.31:443
111.91.87.187:443
86.8.177.143:443
86.97.10.103:443
129.208.184.37:995
220.255.25.187:2222
92.59.35.196:2222
72.252.201.34:465
209.210.95.228:443
68.186.192.69:443
187.121.105.111:995
73.171.4.177:443
27.5.4.111:2222
103.168.241.180:995
103.168.241.180:465
182.176.180.73:443
75.188.35.168:995
86.173.96.86:443
217.165.237.42:443
93.147.212.206:443
5.238.149.197:61202
72.252.201.34:995
24.152.219.253:995
96.37.113.36:993
186.64.67.17:443
45.9.20.200:2211
190.73.3.148:2222
103.150.40.76:995
68.204.7.158:443
80.6.192.58:443
65.100.174.110:8443
103.116.178.85:61200
93.48.58.123:2222
27.223.92.142:995
91.178.126.51:995
41.235.5.174:443
96.246.158.154:995
94.200.181.154:443
50.194.160.233:465
96.21.251.127:2222
216.238.71.31:995
216.238.72.121:995
216.238.72.121:443
162.244.227.45:443
75.66.88.33:443
78.153.126.175:443
206.47.134.234:2222
71.13.93.154:2083
178.239.56.80:443
63.143.92.99:995
189.223.33.109:443
71.13.93.154:6881
81.174.162.180:995
103.143.8.71:995
73.140.38.124:443
79.160.207.214:443
83.223.164.163:443
71.13.93.154:2222
115.96.64.9:995
140.82.49.12:443
120.150.218.241:995
39.49.95.46:995
117.198.148.163:443
111.250.48.162:443
105.198.236.99:995
117.248.109.38:21
103.142.10.177:443
123.252.190.14:443
89.101.97.139:443
78.191.52.30:995
39.33.218.78:995
207.246.112.221:443
207.246.112.221:995
102.65.38.57:443
194.36.28.26:443
93.48.80.198:995
218.101.110.3:995
81.250.153.227:2222
216.238.71.31:443
89.137.52.44:443
136.232.34.70:443
173.21.10.71:2222
41.228.22.180:443
136.143.11.232:443
71.74.12.34:443
76.25.142.196:443
103.116.178.85:993
197.89.108.222:443
75.169.58.229:32100
67.165.206.193:993
73.151.236.31:443
189.135.61.226:443
176.63.117.1:22
94.60.254.81:443
200.127.27.220:465
189.175.54.178:80
100.1.119.41:443
189.147.225.12:443
50.194.160.233:443
50.194.160.233:32100
24.229.150.54:995
24.55.112.61:443
24.139.72.117:443
109.12.111.14:443
45.46.53.140:2222
2.222.167.138:443
86.123.105.31:443
111.91.87.187:443
86.8.177.143:443
86.97.10.103:443
129.208.184.37:995
220.255.25.187:2222
92.59.35.196:2222
72.252.201.34:465
209.210.95.228:443
68.186.192.69:443
187.121.105.111:995
73.171.4.177:443
27.5.4.111:2222
103.168.241.180:995
103.168.241.180:465
182.176.180.73:443
75.188.35.168:995
86.173.96.86:443
217.165.237.42:443
93.147.212.206:443
5.238.149.197:61202
72.252.201.34:995
24.152.219.253:995
96.37.113.36:993
186.64.67.17:443
45.9.20.200:2211
190.73.3.148:2222
103.150.40.76:995
68.204.7.158:443
80.6.192.58:443
65.100.174.110:8443
103.116.178.85:61200
93.48.58.123:2222
27.223.92.142:995
91.178.126.51:995
41.235.5.174:443
96.246.158.154:995
94.200.181.154:443
50.194.160.233:465
96.21.251.127:2222
216.238.71.31:995
216.238.72.121:995
216.238.72.121:443
162.244.227.45:443
75.66.88.33:443
78.153.126.175:443
206.47.134.234:2222
71.13.93.154:2083
178.239.56.80:443
63.143.92.99:995
189.223.33.109:443
71.13.93.154:6881
81.174.162.180:995
103.143.8.71:995
73.140.38.124:443
79.160.207.214:443
83.223.164.163:443
71.13.93.154:2222
115.96.64.9:995
Unpacked files
SH256 hash:
bd7bee9608b74d4301d0cbdb8a6f61bf849fef383f3df673a67b8915fd233b77
MD5 hash:
836f902da17b5c93778ad776c21fae22
SHA1 hash:
f102b0254055d9a47e95062c9b4688e17306b2e7
SH256 hash:
04734be8feb6bf332cba55d71de5b62dd9f43e4ab8f236c5799c6f9d9a0c5c90
MD5 hash:
dd1d4edf9ab9f6ba12a1edd8f18ae7bc
SHA1 hash:
382686cc75283db45437ddbe3cfa4684679fbc59
SH256 hash:
c053795483b5ddb0176a84998a8907fa1997af0e0376275ebf34655f10b174e7
MD5 hash:
8043b539a663ad49d50de454019c247f
SHA1 hash:
1d8df70dbcda228394786454f86681211139729f
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Distributed via e-mail link
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.