MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eb14763a3242cfc46ea26a42f68dec0f08488b12adb9590aebd142844de903a4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: eb14763a3242cfc46ea26a42f68dec0f08488b12adb9590aebd142844de903a4
SHA3-384 hash: cde67623f5610f2e629228800ad640c232d00f1f02ea0de882c7499cf4838c848b04ae373c84506017e7396d01ca6642
SHA1 hash: 2d6bc4f974c1fc026fdb61027ae714ca074fc367
MD5 hash: dec597d191ac75ca1259e0fece21e58c
humanhash: six-london-north-zulu
File name:eb14763a3242cfc46ea26a42f68dec0f08488b12adb9590aebd142844de903a4
Download: download sample
Signature Quakbot
File size:663'040 bytes
First seen:2022-04-01 13:10:00 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 5cc1965f3858b0491d03c9ffe098fae4 (1 x Quakbot)
ssdeep 12288:4uJdUZjRNcK7jAu1girY66/uy/ZxrhQlBxXIk/SbbkSk+Hlir+gtTfZOgu:hJd0nFjA4Y62NQHdIkU7rkr+gtAg
Threatray 396 similar samples on MalwareBazaar
TLSH T14AE4BFB436046CD6D5AF427BDED9ACD913BB2A32CAC6D8CD90657BC30963372EE11805
Reporter malwarelabnet
Tags:biden57 dll Qakbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
229
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Launching a process
Searching for synchronization primitives
Creating a window
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2022-04-01 13:10:09 UTC
File Type:
PE (Dll)
AV detection:
10 of 26 (38.46%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:biden57 campaign:1648796829 banker stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Qakbot/Qbot
Malware Config
C2 Extraction:
75.99.168.194:443
103.107.113.120:443
182.191.92.203:995
108.60.213.141:443
176.67.56.94:443
148.64.96.100:443
47.180.172.159:443
47.23.89.62:995
102.140.71.10:443
113.11.89.170:995
208.107.221.224:443
161.142.56.8:443
5.95.58.211:2087
96.21.251.127:2222
140.82.49.12:443
81.60.217.218:995
93.48.80.198:995
96.29.208.97:443
24.43.99.75:443
39.41.239.60:995
41.228.22.180:443
46.107.48.202:443
83.110.85.209:443
217.164.117.187:2222
41.84.233.53:995
80.11.74.81:2222
66.98.42.102:443
76.169.147.192:32103
176.88.238.122:995
105.226.83.196:995
173.174.216.62:443
187.207.7.231:61202
70.57.207.83:443
47.180.172.159:50010
47.23.89.62:993
70.51.134.168:2222
75.99.168.194:61201
45.9.20.200:443
2.50.22.45:443
207.170.238.231:443
140.82.63.183:995
144.202.3.39:443
149.28.238.199:995
45.63.1.12:443
149.28.238.199:443
144.202.2.175:995
140.82.63.183:443
144.202.2.175:443
45.76.167.26:443
45.63.1.12:995
144.202.3.39:995
45.76.167.26:995
83.110.85.209:995
31.35.28.29:443
102.65.38.90:443
85.104.122.231:443
79.129.121.68:995
32.221.224.140:995
78.167.216.171:443
78.188.76.167:443
71.13.93.154:2222
172.115.177.204:2222
70.46.220.114:443
209.197.176.40:995
58.105.167.36:50000
91.177.173.10:995
103.88.226.30:443
92.177.45.46:2078
24.178.196.158:2222
67.209.195.198:443
37.152.80.105:443
172.114.160.81:995
195.32.32.122:80
118.161.10.164:995
112.199.148.55:995
201.103.199.197:443
125.24.107.95:443
202.134.152.2:2222
46.198.215.60:995
75.188.35.168:443
217.128.122.65:2222
180.183.128.80:2222
78.100.225.12:2222
24.152.219.253:995
86.220.98.71:2222
217.165.109.212:32101
120.150.218.241:995
86.98.157.14:993
117.248.109.38:21
103.87.95.133:2222
116.30.5.125:995
203.122.46.130:443
75.113.214.234:2222
86.98.208.214:2222
190.73.3.148:2222
76.69.155.202:2222
74.15.2.252:2222
76.70.9.169:2222
201.172.31.135:2222
173.21.10.71:2222
71.74.12.34:443
72.76.94.99:443
121.74.182.236:995
76.25.142.196:443
45.46.53.140:2222
96.37.113.36:993
174.69.215.101:443
143.0.34.185:443
191.99.191.28:443
187.250.114.15:443
201.145.189.252:443
72.12.115.90:22
181.62.0.59:443
189.176.231.229:443
109.12.111.14:443
73.151.236.31:443
72.252.201.34:990
72.252.201.34:995
41.107.134.236:443
187.102.135.142:2222
47.156.131.10:443
40.134.246.185:995
24.55.67.176:443
191.251.191.31:443
187.114.248.215:443
90.120.65.153:2078
45.243.22.73:995
196.203.37.215:80
179.158.105.44:443
189.178.218.60:22
191.205.7.5:32101
82.84.66.211:2222
217.164.117.187:1194
100.1.108.246:443
39.49.46.114:995
81.132.186.248:2078
102.159.151.222:443
191.112.12.240:443
37.186.54.166:995
189.115.16.78:443
94.36.190.252:2222
47.156.191.217:443
41.38.167.179:995
82.152.39.39:443
83.110.157.57:2222
45.241.152.155:993
80.11.189.36:6881
85.246.82.244:443
2.50.137.197:443
Unpacked files
SH256 hash:
eb14763a3242cfc46ea26a42f68dec0f08488b12adb9590aebd142844de903a4
MD5 hash:
dec597d191ac75ca1259e0fece21e58c
SHA1 hash:
2d6bc4f974c1fc026fdb61027ae714ca074fc367
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments