MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c135fe92da22d209e22fc7c9ad83d2456f9f783874b1c9ed9be87fed650510e0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
QuakBot
Vendor detections: 9
| SHA256 hash: | c135fe92da22d209e22fc7c9ad83d2456f9f783874b1c9ed9be87fed650510e0 |
|---|---|
| SHA3-384 hash: | a52dc485a8b025c18d52ce2eb962b25088d7e8346b511c4112ee749ebb234c5cab21b45a31dadcca43c6239604757253 |
| SHA1 hash: | 5f055ae0fce7ac670afbd0fa4341bc4632b291f0 |
| MD5 hash: | 3d80c39a1f9d18a7b2397d5ba58c0336 |
| humanhash: | robin-lion-fruit-kilo |
| File name: | c135fe92da22d209e22fc7c9ad83d2456f9f783874b1c9ed9be87fed650510e0 |
| Download: | download sample |
| Signature | QuakBot |
| File size: | 271'872 bytes |
| First seen: | 2020-11-14 18:31:18 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 015974618e9105226f001019d35e62e5 (1'506 x Quakbot) |
| ssdeep | 6144:DLfhdM/bXZswyIyO6t0nh7lqoDKOAP4Pshaop:nvKbXWNmVHelmEaop |
| Threatray | 1'438 similar samples on MalwareBazaar |
| TLSH | CC44F21324759436F81607F68DA6D2F10D6E7828AE3245CF2FC85308472E9B28B777DA |
| Reporter | |
| Tags: | Quakbot |
Intelligence
File Origin
# of uploads :
1
# of downloads :
282
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Qbot
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect virtual machines (IN, VMware)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Qbot
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.PinkSbot
Status:
Malicious
First seen:
2020-11-14 18:35:40 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 1'428 additional samples on MalwareBazaar
Result
Malware family:
qakbot
Score:
10/10
Tags:
family:qakbot banker persistence stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Creates scheduled task(s)
Adds Run key to start application
Qakbot/Qbot
Unpacked files
SH256 hash:
c135fe92da22d209e22fc7c9ad83d2456f9f783874b1c9ed9be87fed650510e0
MD5 hash:
3d80c39a1f9d18a7b2397d5ba58c0336
SHA1 hash:
5f055ae0fce7ac670afbd0fa4341bc4632b291f0
SH256 hash:
a0a3211b52c1559fa19635d9dd37746264b1716594bb0b9b5e3bd2b040e8c764
MD5 hash:
0ffb4ae37e14047ec0e28702f4712a63
SHA1 hash:
24b6f7a130781ccbc09d7f4e291bc78487a1bab6
Detections:
win_qakbot_g0
win_qakbot_auto
SH256 hash:
a704748cdceb5e5f96cd6e131ac644f90a4afe03db1c793970a2336c4a5dea77
MD5 hash:
1724a458d86ec5b7aeda2b0e96176d66
SHA1 hash:
ef53ef5f37d66a0789677dc690d3fdc5d19103e6
Detections:
win_qakbot_auto
Parent samples :
6ca8c7e8acaec97b05aa175a11e2e474621706a320eca4b1b0096d6a150c162c
d9ea9dc5a145e58531ea7b29cd4e38bbc8c36011590f3fada67f54829d6bd118
8f29ad62267629b927d763f557e10e3d4ed3b77c118c02bb143e51d4b4063d2b
38966308974a1973a0ff01395612965813e52cd3c4929e11b32027a5dd461dd9
5a6d7886458e2bf4e05af49a375c0df110893c72568a7f9fd804bbf889e81535
8df12f8055512ff01c690e1b45777fab03eddaf60845afbfadaa3b3d225e3aec
8460eff35d8d6196b16f1b67cfd1557176138962ce63c1eeb0553a700c84c923
789d5cbf2f1d5cf98ab6c8ed84f472786559f6f1dc8cabc5ddbd48b6f25cfe39
bd35fbaa9b56c8bada6f731b09b9db2297eced473bbbc96d355fe24b43ddd248
c135fe92da22d209e22fc7c9ad83d2456f9f783874b1c9ed9be87fed650510e0
2372c12bf9bb289210f9be4cde76110e2848dd34d3c345df8991698b5f024741
0bda4b37e2a0a89a0272b0a5bc87cc25de33ba4ebf4e4c4b35f5094a455c01c9
d9ea9dc5a145e58531ea7b29cd4e38bbc8c36011590f3fada67f54829d6bd118
8f29ad62267629b927d763f557e10e3d4ed3b77c118c02bb143e51d4b4063d2b
38966308974a1973a0ff01395612965813e52cd3c4929e11b32027a5dd461dd9
5a6d7886458e2bf4e05af49a375c0df110893c72568a7f9fd804bbf889e81535
8df12f8055512ff01c690e1b45777fab03eddaf60845afbfadaa3b3d225e3aec
8460eff35d8d6196b16f1b67cfd1557176138962ce63c1eeb0553a700c84c923
789d5cbf2f1d5cf98ab6c8ed84f472786559f6f1dc8cabc5ddbd48b6f25cfe39
bd35fbaa9b56c8bada6f731b09b9db2297eced473bbbc96d355fe24b43ddd248
c135fe92da22d209e22fc7c9ad83d2456f9f783874b1c9ed9be87fed650510e0
2372c12bf9bb289210f9be4cde76110e2848dd34d3c345df8991698b5f024741
0bda4b37e2a0a89a0272b0a5bc87cc25de33ba4ebf4e4c4b35f5094a455c01c9
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.