MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e3a8780ae84c5fd62814de8ae46f05ba28786f8ec8fc665dec190409f89f4e70. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 10


Intelligence 10 IOCs YARA 9 File information Comments

SHA256 hash: e3a8780ae84c5fd62814de8ae46f05ba28786f8ec8fc665dec190409f89f4e70
SHA3-384 hash: 7d1d9bd55228c53bbb544fa3eead469c43d01282ef0fcde72e337c38646bcd03b48c45dc905690626fbe6cddc319beb1
SHA1 hash: 968ef84c96a81e224b8ee5deb760063340429631
MD5 hash: a310b3fec2132cf730abc633826e6ff0
humanhash: berlin-helium-sad-october
File name:SteadingTheraputant.ectocinerea.dll
Download: download sample
Signature Quakbot
File size:278'842 bytes
First seen:2023-05-05 08:43:02 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash aa6732aad80627bf3fc823b2fbac9d4e (2 x Quakbot)
ssdeep 6144:SsUG4yxNqItF5W9XncaWDAdjaTNc8Qs3Az0tDCFHyHQT3JkYVU0ZIf2Bqp:Ssd4VItpkdjSe0AFHyw+0ZHq
Threatray 1 similar samples on MalwareBazaar
TLSH T13654CE11B944E130E9E212F3DABA391A6F6FD670035A62D373605EA51F885D36E3E343
TrID 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.7% (.EXE) Win64 Executable (generic) (10523/12/4)
7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter spc64_
Tags:dll qbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
358
Origin country :
CH CH
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found API chain indicative of debugger detection
Found malware configuration
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected Qbot
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 859693 Sample: SteadingTheraputant.ectocin... Startdate: 05/05/2023 Architecture: WINDOWS Score: 100 42 173.184.44.185 WINDSTREAMUS United States 2->42 44 98.19.224.125 WINDSTREAMUS United States 2->44 46 95 other IPs or domains 2->46 52 Found malware configuration 2->52 54 Yara detected Qbot 2->54 56 Sample uses string decryption to hide its real strings 2->56 58 2 other signatures 2->58 10 loaddll32.exe 1 2->10         started        signatures3 process4 process5 12 rundll32.exe 10->12         started        15 rundll32.exe 10->15         started        17 cmd.exe 1 10->17         started        19 8 other processes 10->19 signatures6 64 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 12->64 66 Writes to foreign memory regions 12->66 68 Allocates memory in foreign processes 12->68 70 Maps a DLL or memory area into another process 12->70 21 wermgr.exe 12->21         started        72 Found API chain indicative of debugger detection 15->72 25 WerFault.exe 17 9 15->25         started        27 rundll32.exe 17->27         started        29 WerFault.exe 2 9 19->29         started        31 WerFault.exe 9 19->31         started        process7 dnsIp8 48 91.75.121.31, 443, 49724 DU-AS1AE United Arab Emirates 21->48 60 Uses ping.exe to sleep 21->60 62 Uses ping.exe to check the status of other devices and networks 21->62 33 PING.EXE 21->33         started        36 WerFault.exe 7 9 27->36         started        50 192.168.2.1 unknown unknown 29->50 signatures9 process10 dnsIp11 40 yahoo.com 74.6.231.20 YAHOO-NE1US United States 33->40 38 conhost.exe 33->38         started        process12
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2023-05-05 08:44:07 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
8 of 37 (21.62%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Unpacked files
SH256 hash:
7fdeb20b750ece1b386cfa5bab14f846be0266bd88b23f66f6e5b58eca98096e
MD5 hash:
93db159a6c114bde58bb53a4f6d93205
SHA1 hash:
73e6cb791df53e2b2befda04860c213e63072105
Detections:
Qakbot win_qakbot_auto
SH256 hash:
e3a8780ae84c5fd62814de8ae46f05ba28786f8ec8fc665dec190409f89f4e70
MD5 hash:
a310b3fec2132cf730abc633826e6ff0
SHA1 hash:
968ef84c96a81e224b8ee5deb760063340429631
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_QakBot_ConfigExtraction_Feb23
Author:kevoreilly
Description:QakBot Config Extraction
Reference:https://github.com/kevoreilly/CAPEv2/blob/master/analyzer/windows/data/yara/QakBot.yar
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:QakBot
Author:kevoreilly
Description:QakBot Payload
Rule name:qakbot_api_hashing
Author:@Embee_Research
Reference:https://twitter.com/embee_research/status/1592067841154756610
Rule name:unpacked_qbot
Description:Detects unpacked or memory-dumped QBot samples
Rule name:Windows_Trojan_Qbot_1ac22a26
Author:Elastic Security
Rule name:win_qakbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.qakbot.
Rule name:win_qakbot_malped
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.qakbot.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Quakbot

DLL dll e3a8780ae84c5fd62814de8ae46f05ba28786f8ec8fc665dec190409f89f4e70

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments