MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eba9c787915db694ba3d567dce84b5b76b639e0ba4c0bbe10113dd21e3299feb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: eba9c787915db694ba3d567dce84b5b76b639e0ba4c0bbe10113dd21e3299feb
SHA3-384 hash: e447b540d7d89aa0185526d063948f15e1609924c4015261d4e4db6fee6014ae7ff41113764136c652b9d277c10a0914
SHA1 hash: d5769dabf6f4814c0b6a707d4d18db2af57355e9
MD5 hash: 2449a2a1a20c37b570a8f3ad3174ab64
humanhash: vermont-two-oklahoma-friend
File name:9237537
Download: download sample
Signature Quakbot
File size:3'034'072 bytes
First seen:2020-11-28 07:20:02 UTC
Last seen:2020-11-28 08:48:12 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash a326e84e9e4432f34b03d70a0c7d4ddf (7 x Quakbot)
ssdeep 3072:s8qk4FRozXKEI7jQC5VrmpL2zqpwAZpDpOJl+V:s8qkyT7jzGl22pbZJ3
Threatray 1'348 similar samples on MalwareBazaar
TLSH F8E5B12E3C6BB77AAE5241746856AE7CC6197F88F97B00A817C7274845D7CE23E1E0C4
Reporter JAMESWT_WT
Tags:dll Qakbot qbot Quakbot signed Školab s.r.o.

Code Signing Certificate

Organisation:
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Nov 11 00:00:00 2020 GMT
Valid to:Nov 11 23:59:59 2021 GMT
Serial number: B8B58B6CFE395E338F3476D121E78139
Intelligence: 9 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: A3E4C97FE15C32445F1C603421B464D74A7FBE6DB23ED994AD7EBF17E77DC01A
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
253
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the Windows subdirectories
Launching a process
Modifying an executable file
Creating a process with a hidden window
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-11-28 07:19:32 UTC
File Type:
PE (Dll)
Extracted files:
33
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:abc101 campaign:1606331967 banker cryptone packer stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Loads dropped DLL
Qakbot/Qbot
Malware Config
C2 Extraction:
76.104.230.174:443
187.227.86.129:995
219.255.28.241:443
78.184.6.94:443
95.159.45.82:443
91.228.36.95:443
79.115.215.125:443
24.244.161.36:443
24.71.28.247:443
73.239.229.107:995
187.153.119.36:443
190.75.167.44:2222
83.110.111.159:443
174.76.21.134:443
75.109.180.221:443
85.122.141.42:995
156.222.6.246:995
188.24.183.193:443
88.106.237.152:2222
79.166.83.103:2222
74.73.27.35:443
200.140.154.174:2222
173.173.1.164:443
89.33.87.107:443
86.97.221.121:443
72.241.205.69:443
196.89.180.164:443
83.110.19.27:443
95.77.223.148:443
47.22.148.6:443
196.204.207.111:443
79.129.121.81:995
98.115.243.237:443
105.198.236.99:443
68.134.181.98:443
69.47.239.10:443
67.82.244.199:2222
2.51.246.190:995
200.75.136.78:443
79.119.20.151:443
31.46.48.119:443
2.86.41.23:2222
108.30.125.94:443
189.210.115.207:443
187.149.129.239:443
84.117.176.32:443
189.141.31.12:443
185.105.131.233:443
95.76.27.6:443
73.56.2.167:443
189.131.107.239:995
68.225.60.77:995
90.174.217.251:2222
68.116.193.239:443
73.166.10.38:995
98.26.50.62:995
95.77.144.238:443
98.4.227.199:443
201.170.194.40:995
174.29.203.226:993
120.150.218.241:995
85.204.189.105:443
67.6.54.180:443
5.15.225.109:443
98.240.24.57:443
216.201.162.158:443
173.197.22.90:2222
217.165.2.92:995
67.8.103.21:443
76.181.122.120:443
174.62.13.151:443
172.87.134.226:443
108.160.123.244:443
50.244.112.106:443
2.7.202.106:2222
187.136.203.196:443
190.220.8.10:995
89.136.39.108:443
24.138.77.61:443
187.213.136.249:995
73.166.10.38:443
85.60.132.8:2087
84.78.128.76:2078
146.199.132.233:2222
24.201.61.153:2078
189.250.115.177:2222
2.190.10.89:995
72.240.200.181:2222
172.114.116.226:995
72.190.101.70:443
109.209.94.165:2222
92.59.35.196:2083
37.107.82.136:443
174.76.11.123:995
72.252.201.69:443
172.116.85.178:443
72.29.181.78:2078
178.223.20.246:995
98.30.44.223:2222
189.231.173.158:443
39.32.125.15:995
185.138.134.150:443
105.198.236.101:443
5.14.152.241:443
149.28.98.196:2222
45.63.107.192:2222
208.93.202.41:443
45.77.193.83:443
93.177.172.131:443
149.28.98.196:443
45.63.107.192:995
5.107.34.225:22
98.199.189.220:61202
149.28.98.196:995
149.28.99.97:443
72.204.242.138:443
149.28.99.97:2222
50.244.112.90:443
182.48.138.42:443
69.123.179.70:443
90.101.62.189:2222
41.228.197.242:443
190.128.215.174:443
188.26.243.119:443
73.248.120.240:443
72.36.59.46:2222
24.152.219.253:995
189.172.247.56:443
199.19.117.131:443
89.137.211.239:443
37.116.152.122:2222
83.202.68.220:2222
216.215.77.18:2078
96.37.113.36:993
92.154.83.96:2222
73.55.254.225:443
24.122.0.90:443
68.192.50.231:443
86.218.67.235:2222
116.240.78.45:995
105.101.216.210:443
77.27.174.49:995
98.121.187.78:443
201.152.69.217:995
75.136.26.147:443
92.137.138.52:2222
71.182.142.63:443
178.87.29.72:443
75.136.40.155:443
201.152.196.4:443
Unpacked files
SH256 hash:
a55420d80d69d322ce9f9d63cbfa96bf13f698428ba340d98086fde7c2ce561e
MD5 hash:
8f942b3a77a97be1ab83040257656616
SHA1 hash:
e2ce1da0bd3b8bdd7fb6fdc5d95554ad66ae43fb
SH256 hash:
eba9c787915db694ba3d567dce84b5b76b639e0ba4c0bbe10113dd21e3299feb
MD5 hash:
2449a2a1a20c37b570a8f3ad3174ab64
SHA1 hash:
d5769dabf6f4814c0b6a707d4d18db2af57355e9
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments