MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dc062275af294c93bf891da3aa1445bb52433632e83c97d152d05f0aa3466650. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: dc062275af294c93bf891da3aa1445bb52433632e83c97d152d05f0aa3466650
SHA3-384 hash: 070d77afd1eda81b0e20eebdd5a37b3850640e39162c468dc20b05811db9fd548eb4ffd2420c29de7300881a4581810c
SHA1 hash: 5c391622b2ff9a7c7ab688e49cd84312703f946c
MD5 hash: af29d0ec9f9cdd8a8ff0b8dfc3d010cd
humanhash: steak-six-may-alpha
File name:dc062275af294c93bf891da3aa1445bb52433632e83c97d152d05f0aa3466650
Download: download sample
Signature QuakBot
File size:1'094'096 bytes
First seen:2020-11-15 09:55:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b8c436887f0ff05ef82a9442bb6ba7ca (3 x QuakBot)
ssdeep 12288:1qflDDoYel20NNHCizXv+Omjt7Wq2X6EQ2Xbhvs:100k0NNHCgCt7GNbRs
Threatray 1'451 similar samples on MalwareBazaar
TLSH 4735011BF2E35E9BD893447D59E284B98031EFADD31BE4732A48F5DA31F26C4822E505
Reporter JAMESWT_WT
Tags:Orangetree B.V. Qakbot Quakbot signed

Code Signing Certificate

Organisation:Orangetree B.V.
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Nov 4 00:00:00 2020 GMT
Valid to:Nov 4 23:59:59 2021 GMT
Serial number: 7E0CCDA0EF37ACEF6C2EBE4538627E5C
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: D032358A31097655857E002CE8EC0FA10DDA8E7569D97955CED1DACC7D79926A
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
196
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Sending a UDP request
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.QBot
Status:
Malicious
First seen:
2020-11-13 16:15:45 UTC
File Type:
PE (Exe)
AV detection:
28 of 29 (96.55%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
dc062275af294c93bf891da3aa1445bb52433632e83c97d152d05f0aa3466650
MD5 hash:
af29d0ec9f9cdd8a8ff0b8dfc3d010cd
SHA1 hash:
5c391622b2ff9a7c7ab688e49cd84312703f946c
SH256 hash:
f22b7446378015d1b677cf9f10f89d5db07dabbf1029d1de281f28f187287dba
MD5 hash:
0640b3b6e2f61abb7a211d94384a4b40
SHA1 hash:
3fdcc7119fb07db6f4090d79df6fbda51c7b8bf1
Detections:
win_qakbot_g0 win_qakbot_auto
SH256 hash:
4692f0a62f714d0acb7a58b0f52e96844d75e93980e87a3c959eb6773d734e0d
MD5 hash:
34b6b8e9f422bd64ddac18fb466cbdfa
SHA1 hash:
fb0f92fcab48eb274191d734fc557158c0ebc8df
Detections:
win_qakbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments