MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e0d2dc14d215014e1ebd9828a29a77de5e384a4a178ae785a915756501716e32. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: e0d2dc14d215014e1ebd9828a29a77de5e384a4a178ae785a915756501716e32
SHA3-384 hash: d7f4be57e38485cfd74445df49cf2f032a6b6f686ce8b77967e7294f08ede25f3f7aa2076986a9ed027097e5963141cf
SHA1 hash: 3a0dd4badb04856a08e349584e46671f309eaf80
MD5 hash: d911f60dcbd502f574433fc3f45f1140
humanhash: king-mango-network-magnesium
File name:923753.exe
Download: download sample
File size:261'592 bytes
First seen:2020-11-25 17:03:40 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash fcb7e66723aeaab780b1c2b44639282c (1 x Quakbot)
ssdeep 3072:O3BNzcIx2gLs5VVnvQYyLTUQHPH3MkKiXy4o+4z774L4yFpeQjLrmzht3WaM0A:OfXgB9yLTUQvH3nKiXtozvYpewrkRMv
Threatray 1'328 similar samples on MalwareBazaar
TLSH EC44AF79BA12DC12E6682BB062C36FD81E879AD93510510F59F15F9CBEEA3847C13BC4
Reporter ffforward
Tags:dll Qakbot qbot Quakbot signed Školab s.r.o.

Code Signing Certificate

Organisation:
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Nov 11 00:00:00 2020 GMT
Valid to:Nov 11 23:59:59 2021 GMT
Serial number: B8B58B6CFE395E338F3476D121E78139
Intelligence: 9 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: A3E4C97FE15C32445F1C603421B464D74A7FBE6DB23ED994AD7EBF17E77DC01A
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the Windows subdirectories
Launching a process
Modifying an executable file
Creating a process with a hidden window
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.QBot
Status:
Malicious
First seen:
2020-11-25 17:06:09 UTC
File Type:
PE (Dll)
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Suspicious use of AdjustPrivilegeToken
Program crash
Loads dropped DLL
Unpacked files
SH256 hash:
e0d2dc14d215014e1ebd9828a29a77de5e384a4a178ae785a915756501716e32
MD5 hash:
d911f60dcbd502f574433fc3f45f1140
SHA1 hash:
3a0dd4badb04856a08e349584e46671f309eaf80
SH256 hash:
2f90d572b1d449a524086d7f667183d3f65652ac255890e0e6b6a45b5462ae71
MD5 hash:
917f657d8a3dc25dc5b8219511624fbb
SHA1 hash:
32363973a8d01bfcf8d844ef37ca350d4d3b206c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DLL dll e0d2dc14d215014e1ebd9828a29a77de5e384a4a178ae785a915756501716e32

(this sample)

Comments