MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cf050a02d2bf08c1becb9959c937c0458e9c09111d44a425096b9fafd25b6528. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: cf050a02d2bf08c1becb9959c937c0458e9c09111d44a425096b9fafd25b6528
SHA3-384 hash: 413a2c0496216b71757e815fb25799799821b047ea5886c9cc72db79a166fa077e56ccf2dfe92f43baca00ae2dbb6ec3
SHA1 hash: 359e54a2254774f9d9f9ed7e03fd4ac25c975be8
MD5 hash: 92fada2d1fc5cd4acacb314545f7574a
humanhash: iowa-solar-spring-music
File name:cf050a02d2bf08c1becb9959c937c0458e9c09111d44a425096b9fafd25b6528
Download: download sample
Signature QuakBot
File size:256'016 bytes
First seen:2020-11-05 23:53:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 6144:8awCRk4Z0NhbhkX2RaiHwRBPvWkWqV1L38ucncA:cGk4ZkhOGDQRBP+kWqXouacA
TLSH F244DF4253DC4045F87796BBCC7282211112BCA5572E9FDE0EC5B3AD4F3AE62ABD0729
Reporter seifreed
Tags:Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
51
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Sending a UDP request
Creating a process from a recently created file
Launching a process
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-10-31 09:56:53 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments