MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c7a0cf59d0df795f6fc9383cfdeb2335b658ea12ad6ea8a5b69a211601ff975d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: c7a0cf59d0df795f6fc9383cfdeb2335b658ea12ad6ea8a5b69a211601ff975d
SHA3-384 hash: 98f4028eac55b9549c88ffe63c371956cdf253e0b0a13309060ce8058cbde5cbf00452398ffe98ee71b21f3d589cc5db
SHA1 hash: fcff62b8d0f145ade8e0887dbb4ce74471fa7f3d
MD5 hash: da96431674f705b6f54f95d2ecca0d95
humanhash: table-ohio-table-dakota
File name:da96431674f705b6f54f95d2ecca0d95
Download: download sample
Signature Quakbot
File size:1'257'472 bytes
First seen:2021-11-11 17:18:01 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash ccf9180eff944e2399d200ef89ff0d3f (2 x Quakbot)
ssdeep 24576:010p0mrfiksx6rbhXaU17hgLnyNYHpQ81m9NJC817zZa6:0eD4ePJCi7d
Threatray 364 similar samples on MalwareBazaar
TLSH T10B458D22F6C14437C1332B3CDC6B6768593ABE112E38984A6BF55D4C4F3A6817D682E7
File icon (PE):PE icon
dhash icon 399998ecd4d46c0e (572 x Quakbot, 137 x ArkeiStealer, 82 x GCleaner)
Reporter malwarelabnet
Tags:dll Qakbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
224
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
keylogger packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Injuke
Status:
Malicious
First seen:
2021-11-11 17:18:07 UTC
AV detection:
13 of 44 (29.55%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:obama125 campaign:1636625439 banker evasion stealer trojan
Behaviour
Creates scheduled task(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Loads dropped DLL
Qakbot/Qbot
Windows security bypass
Malware Config
C2 Extraction:
117.198.155.237:443
190.73.3.148:2222
63.143.92.99:995
216.238.71.31:443
216.238.72.121:995
216.238.71.31:995
216.238.72.121:443
105.198.236.99:995
136.232.34.70:443
41.37.243.129:443
140.82.49.12:443
71.13.93.154:2222
96.246.158.154:995
102.65.38.57:443
71.13.93.154:6881
123.252.190.14:443
45.9.20.200:2211
136.143.11.232:443
103.143.8.71:995
103.142.10.177:443
109.177.77.68:995
117.248.109.38:21
120.150.218.241:995
86.98.1.197:443
89.101.97.139:443
94.200.181.154:443
71.13.93.154:2083
93.48.80.198:995
96.21.251.127:2222
86.97.8.204:443
27.223.92.142:995
88.234.20.155:995
115.96.64.9:995
207.246.112.221:443
207.246.112.221:995
129.208.156.253:995
177.172.5.228:995
173.21.10.71:2222
89.137.52.44:443
83.223.164.163:443
76.25.142.196:443
73.151.236.31:443
189.135.98.193:443
71.74.12.34:443
50.194.160.233:443
187.192.70.196:80
189.223.33.109:443
93.147.212.206:443
86.8.177.143:443
50.194.160.233:32100
68.204.7.158:443
45.46.53.140:2222
65.100.174.110:8443
100.1.119.41:443
181.118.183.27:443
189.147.225.12:443
72.252.147.208:995
181.4.49.208:465
24.229.150.54:995
24.55.112.61:443
72.252.147.208:465
24.139.72.117:443
81.250.153.227:2222
78.153.126.175:443
109.12.111.14:443
197.87.182.15:443
91.178.126.51:995
108.4.67.252:443
39.49.72.230:995
146.66.139.84:443
103.116.178.85:993
182.176.180.73:443
67.165.206.193:993
75.66.88.33:443
94.110.12.148:995
79.160.207.214:443
111.250.56.31:443
189.146.127.83:443
2.222.167.138:443
94.60.254.81:443
77.57.204.78:443
75.188.35.168:443
93.48.58.123:2222
41.228.22.180:443
96.37.113.36:993
68.186.192.69:443
92.59.35.196:2222
115.186.190.72:995
86.173.96.126:443
109.133.93.127:995
80.6.192.58:443
109.228.255.59:443
176.35.109.202:2222
72.27.126.188:995
103.150.40.76:995
103.143.8.71:443
185.53.147.51:443
75.169.58.229:32100
162.244.227.34:443
216.201.162.158:443
39.52.224.170:995
188.27.119.243:443
50.194.160.233:465
73.25.109.183:2222
47.72.219.120:995
196.207.140.40:995
115.96.188.188:995
70.93.80.154:443
88.253.105.24:443
27.5.5.31:2222
212.216.213.88:443
Unpacked files
SH256 hash:
edd84f29f1e3eb45c3287908ff82e493c811d9b7051ec66a6d658f63aaaf6182
MD5 hash:
b8a10df71b2ad998ed8696e92db17490
SHA1 hash:
bcb2a911e041fa2d5b35ade92f0c4973aef94010
SH256 hash:
18df034ee69d675ce1b04b95569154f0e3fe41c8bd6a00e59e8dae24b41ed7f7
MD5 hash:
35927b301d9cd6c33a927b97dccf6266
SHA1 hash:
1ccb9ec68f0fd685a58b1b6d2e78ba3b878783da
SH256 hash:
c7a0cf59d0df795f6fc9383cfdeb2335b658ea12ad6ea8a5b69a211601ff975d
MD5 hash:
da96431674f705b6f54f95d2ecca0d95
SHA1 hash:
fcff62b8d0f145ade8e0887dbb4ce74471fa7f3d
Malware family:
CryptOne
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:QakBot
Author:kevoreilly
Description:QakBot Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments