MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f51a75713876ad3ed2ef6910b48120aca68d57f03c3e84a7ed2a8df11be1fe9f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: f51a75713876ad3ed2ef6910b48120aca68d57f03c3e84a7ed2a8df11be1fe9f
SHA3-384 hash: e057feabf43696653224bf92dc968ffd1283446f758a60c0d2895b8fcf0209209348712f0a8822aef20af0695f131db9
SHA1 hash: eb8dd909d89397de33617961f77c8fac4bb7ee81
MD5 hash: 34b54f74df43d0aeb726666ae8b5db3a
humanhash: early-yellow-pasta-cardinal
File name:f51a75713876ad3ed2ef6910b48120aca68d57f03c3e84a7ed2a8df11be1fe9f
Download: download sample
Signature Quakbot
File size:833'128 bytes
First seen:2022-03-08 18:48:23 UTC
Last seen:2022-03-08 20:45:55 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 5d6fa77bb261ad530fb576f1a51f3820 (3 x Quakbot)
ssdeep 12288:LAchha95RMxuPdeRcB/kXlbJn0aWRPsEe+t598rUoF+DgPpnXliz6f:kCh2RMcFoqkXlFST5yrUWUgPpnXliWf
Threatray 144 similar samples on MalwareBazaar
TLSH T183059D2AB28085FADB332E3C4C5556F47B797C33E91AAA8D67D41C4F4A38761281C367
Reporter malwarelabnet
Tags:dll Qakbot Quakbot tr

Intelligence


File Origin
# of uploads :
2
# of downloads :
194
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Launching a process
Searching for synchronization primitives
Creating a window
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe greyware keylogger overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.KBot
Status:
Malicious
First seen:
2022-03-08 18:49:12 UTC
File Type:
PE (Dll)
Extracted files:
36
AV detection:
23 of 27 (85.19%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:tr campaign:1646208301 banker stealer trojan
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Qakbot/Qbot
Malware Config
C2 Extraction:
75.67.194.204:443
124.41.193.166:443
217.128.122.65:2222
128.106.122.206:443
118.161.12.23:443
89.101.97.139:443
31.215.84.57:2222
32.221.231.1:443
102.156.225.86:443
2.50.37.117:443
217.165.146.156:32101
180.183.100.147:2222
80.14.188.219:2222
167.86.202.26:443
111.125.245.118:995
117.248.109.38:21
86.98.156.238:993
120.61.2.121:443
91.177.173.10:995
176.110.96.225:443
176.57.126.138:443
41.230.62.211:993
197.164.171.102:995
96.21.251.127:2222
2.50.41.69:61200
74.15.2.252:2222
182.191.92.203:995
80.11.74.81:2222
89.137.52.44:443
41.43.13.54:995
209.210.95.228:32100
63.153.150.20:443
196.203.37.215:80
190.73.3.148:2222
118.189.242.45:2083
185.249.85.209:443
63.143.92.99:995
103.230.180.119:443
160.179.163.47:443
93.48.80.198:995
41.84.236.119:443
78.100.194.138:6883
114.79.148.170:443
103.87.95.131:2222
144.202.2.175:443
176.67.56.94:443
66.230.104.103:443
47.180.172.159:443
76.25.142.196:443
140.82.49.12:443
75.99.168.194:443
202.56.44.112:993
197.167.46.225:993
47.180.172.159:50010
86.98.149.6:995
24.178.196.158:2222
76.69.155.202:2222
105.184.116.32:995
2.50.27.78:443
208.107.221.224:443
173.174.216.62:443
47.23.89.60:993
197.167.46.225:995
75.188.35.168:443
141.237.140.181:995
76.169.147.192:32103
75.99.168.194:61201
70.57.207.83:443
103.133.200.140:443
186.64.67.40:443
121.74.187.191:995
41.13.143.139:443
136.143.11.232:443
41.228.22.180:443
45.46.53.140:2222
5.88.12.21:443
144.202.2.175:995
69.14.172.24:443
118.161.12.23:995
31.215.70.101:443
92.177.45.46:2078
197.89.109.221:443
188.50.5.129:995
89.211.185.240:2222
193.253.44.249:2222
58.105.167.35:50000
120.150.218.241:995
76.70.9.169:2222
180.233.150.134:995
220.129.52.36:443
86.105.41.126:61202
67.209.195.198:443
39.44.58.183:995
86.97.247.128:1194
75.156.151.34:443
103.139.242.30:990
39.52.44.39:995
173.21.10.71:2222
102.65.38.67:443
71.74.12.34:443
189.253.111.123:995
119.158.98.225:995
191.99.191.28:443
190.189.33.6:32101
47.156.131.10:443
73.151.236.31:443
98.17.34.83:995
149.135.101.20:443
201.103.17.10:443
100.1.108.246:443
70.51.153.159:2222
72.252.201.34:995
72.252.201.34:990
208.101.87.135:443
105.224.227.30:995
108.4.67.252:443
161.142.56.218:443
38.70.253.226:2222
24.55.67.176:443
47.156.191.217:443
39.52.218.58:995
78.96.235.245:443
217.164.117.158:2222
109.12.111.14:443
41.84.229.223:995
5.95.58.211:2087
39.49.63.64:995
82.152.39.39:443
80.123.141.226:443
176.88.238.122:995
151.69.0.8:995
184.100.174.73:443
183.82.103.213:443
82.41.63.217:443
103.139.242.30:993
81.229.130.188:443
43.252.72.97:2222
115.69.247.95:443
67.165.206.193:993
118.189.242.45:2222
108.16.33.18:443
86.198.170.170:2222
68.204.7.158:443
84.241.8.23:32103
78.191.34.56:995
121.7.223.188:2222
218.111.147.237:443
86.139.33.187:443
86.98.51.143:995
Unpacked files
SH256 hash:
774d7d9f834dacf41837b67315fc44def3d59de451ac09b5963b10ae54a4b775
MD5 hash:
7d8c446179670b29b90a975029d3e9a1
SHA1 hash:
0836a84f3340862e2377dfee1d4aa9b635dafc7d
SH256 hash:
29d6b46991d1e5485f07c43265ea559d02dbf268329da49e1390543ff9966f0e
MD5 hash:
b15c839d193e44a0ddafc59f29f9d663
SHA1 hash:
19f479dfaa708b9013083d3551d248f735325d18
SH256 hash:
f51a75713876ad3ed2ef6910b48120aca68d57f03c3e84a7ed2a8df11be1fe9f
MD5 hash:
34b54f74df43d0aeb726666ae8b5db3a
SHA1 hash:
eb8dd909d89397de33617961f77c8fac4bb7ee81
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments