MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d4d9bc5f48e3b718c1e1c9845e9a4ae1f70f4f4d94abed767bf4c314d0f2c0a4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: d4d9bc5f48e3b718c1e1c9845e9a4ae1f70f4f4d94abed767bf4c314d0f2c0a4
SHA3-384 hash: da1b8355cdc268b6478154e9ff6532743d7ba817c47b6740b15d5f1f4aec0cd4797b4df93d6afa9cdb7c9ecd3f2b2c7f
SHA1 hash: 3ca2e33f961255f444a5ec3a83bb59100ce63bb6
MD5 hash: abe28f00c672bdc6d6227e00a02ce3b7
humanhash: vegan-alanine-hot-california
File name:5fcd0bd874ac7da0f10a4691ea261b2a
Download: download sample
Signature QuakBot
File size:1'093'096 bytes
First seen:2020-11-17 11:22:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3cff6a264a1d694a36fac2c685f6a919 (9 x QuakBot)
ssdeep 12288:BqflDFoQwFc0NNHCW8k45hox9l7pUH5X6EQ2XbhL:B0AG0NNHCWZmO7aH1NbV
Threatray 2'447 similar samples on MalwareBazaar
TLSH EF35011BE1E35BCBE493807C69E2917AD532EF8DDB1BD47B2A18F09871B23C5891E504
Reporter seifreed
Tags:Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
66
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
0
Threat name:
Win32.Trojan.PinkSbot
Status:
Malicious
First seen:
2020-11-17 11:23:22 UTC
AV detection:
25 of 28 (89.29%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
4d83173a81b9eedeab641f5cff5aef998fdb23b6d507613a66b9ef74dc511939
MD5 hash:
b5ba19044eb3bdd1275c7382bcffcc7b
SHA1 hash:
7547c505cfec88eb470c1b24d4e58d57ddaa0ace
Detections:
win_qakbot_auto
SH256 hash:
8f3d5801ea9c83140b4bdf4b38b5ad02bcff9251624b0e33f88b7887f0e1faf0
MD5 hash:
ee0aac27bad677f433e5c799a51ea805
SHA1 hash:
8443ce1da497e251b4ed6c18534639f61d9c0093
Detections:
win_qakbot_g0 win_qakbot_auto
SH256 hash:
d4d9bc5f48e3b718c1e1c9845e9a4ae1f70f4f4d94abed767bf4c314d0f2c0a4
MD5 hash:
abe28f00c672bdc6d6227e00a02ce3b7
SHA1 hash:
3ca2e33f961255f444a5ec3a83bb59100ce63bb6
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments