MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fbc5eb4ff094c35043da78b132727f70abb275b18ad4eba8dc291bf24204042f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: fbc5eb4ff094c35043da78b132727f70abb275b18ad4eba8dc291bf24204042f
SHA3-384 hash: b6df2354a23f0e5459c67df76ac6751803bf1dab8db9617e67c3d695694f92ac085968222871fd0700bfe4291063ddf0
SHA1 hash: 266a09bab85ae5432ae1ec29cbb0c84e06b53d07
MD5 hash: 98c5560f0c154d1d4b48138630fd9934
humanhash: july-carbon-saturn-kilo
File name:BOREC, OOO Qakbot
Download: download sample
Signature Quakbot
File size:1'744'848 bytes
First seen:2020-08-26 09:48:12 UTC
Last seen:2020-08-26 10:56:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d71f47449a209ada960b8d29bf743305 (3 x Quakbot)
ssdeep 6144:7GUgm5pEfjVcje9Ox/Tc4S+19GiwaNQP+T7NMgZQuA:7MBcjewb1ZNQWT7NMgs
Threatray 431 similar samples on MalwareBazaar
TLSH 4C85F1213AF64066EF4A47BC316BCC3081522C92A6E5D0D62EC6F0F71CF7A5396EB645
Reporter JAMESWT_WT
Tags:BOREC OOO Qakbot Quakbot signed

Code Signing Certificate

Organisation:BOREC
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Aug 14 00:00:00 2020 GMT
Valid to:Aug 14 23:59:59 2021 GMT
Serial number: 7156EC47EF01AB8359EF4304E5AF1A05
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: 59FE580974E2F813C2A00B4BE01ACD46C94FDEA89A3049433CD5BA5A2D96666D
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
192
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Enabling autorun by creating a file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect virtual machines (IN, VMware)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 278345 Sample: BOREC, OOO Qakbot Startdate: 27/08/2020 Architecture: WINDOWS Score: 100 32 Antivirus / Scanner detection for submitted sample 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 Machine Learning detection for sample 2->36 38 4 other signatures 2->38 7 BOREC, OOO Qakbot.exe 4 2->7         started        10 BOREC, OOO Qakbot.exe 2->10         started        12 BOREC, OOO Qakbot.exe 2->12         started        process3 file4 28 C:\Users\user\AppData\Roaming\...\koqyiq.exe, PE32 7->28 dropped 30 C:\Users\user\...\koqyiq.exe:Zone.Identifier, ASCII 7->30 dropped 14 koqyiq.exe 7->14         started        17 schtasks.exe 1 7->17         started        19 BOREC, OOO Qakbot.exe 7->19         started        process5 signatures6 42 Antivirus detection for dropped file 14->42 44 Multi AV Scanner detection for dropped file 14->44 46 Detected unpacking (changes PE section rights) 14->46 48 7 other signatures 14->48 21 explorer.exe 1 14->21         started        24 koqyiq.exe 14->24         started        26 conhost.exe 17->26         started        process7 signatures8 40 Contains functionality to compare user and computer (likely to detect sandboxes) 21->40
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-08-25 07:17:35 UTC
File Type:
PE (Exe)
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
trojan banker stealer family:qakbot
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Qakbot/Qbot
Malware Config
C2 Extraction:
31.5.21.66:443
49.191.130.48:443
86.98.56.189:443
94.96.40.90:21
24.27.82.216:2222
39.36.137.147:995
216.201.162.158:443
77.30.180.199:995
74.56.167.31:443
67.209.195.198:443
173.173.72.199:443
98.16.204.189:995
2.42.219.242:443
101.108.125.71:443
100.37.36.240:443
72.28.255.159:995
85.122.141.42:995
213.120.109.73:2222
144.202.48.107:443
94.59.241.189:995
188.27.47.246:443
96.41.93.96:443
71.126.139.251:443
47.153.115.154:995
81.133.234.36:2222
75.182.220.196:2222
104.221.4.11:2222
165.120.230.108:2222
137.99.224.198:443
72.204.242.138:443
185.19.190.81:443
209.182.122.217:443
70.164.37.205:995
97.93.211.17:443
70.168.130.172:995
72.66.47.70:443
203.106.195.67:443
31.215.99.5:443
199.116.241.147:443
75.110.250.89:995
207.246.75.201:443
117.218.208.239:443
199.247.16.80:443
156.213.184.5:443
45.32.154.10:443
207.246.71.122:443
80.240.26.178:443
78.100.229.44:61201
197.37.219.90:993
83.110.6.64:2222
87.255.83.83:443
66.30.92.147:443
69.26.23.143:2222
94.59.241.189:2222
65.96.36.157:443
46.53.29.107:443
74.73.120.226:443
217.162.149.212:443
206.51.202.106:50003
47.146.32.175:443
24.37.178.158:443
24.234.86.201:995
175.211.225.118:443
199.16.56.200:443
69.11.247.242:443
39.118.245.6:443
172.91.19.192:443
94.52.160.116:443
31.14.108.114:2222
59.26.204.144:443
2.7.65.32:2222
189.210.114.157:443
95.76.185.240:443
103.76.160.110:443
175.111.128.234:443
2.90.177.57:995
86.122.251.89:2222
5.193.155.181:2078
102.41.113.26:995
115.21.224.117:443
98.22.67.68:443
98.210.41.34:443
93.151.180.170:61202
66.215.32.224:443
35.134.202.234:443
5.235.83.169:995
24.116.227.63:443
68.204.164.222:443
75.87.161.32:995
73.78.149.206:443
141.158.47.123:443
47.138.204.170:443
103.238.231.40:443
151.52.168.224:443
83.110.92.29:443
74.129.24.163:443
89.32.218.159:443
67.165.206.193:993
24.205.42.241:443
45.32.155.12:443
96.20.108.17:2222
199.247.22.145:443
27.32.60.54:443
5.15.65.198:2222
76.111.128.194:443
75.137.239.211:443
200.124.231.21:443
86.127.145.20:2222
41.227.93.247:443
95.77.223.148:443
202.141.244.118:995
188.26.11.29:2222
182.185.59.185:995
47.44.217.98:443
67.170.137.8:443
98.219.77.197:443
82.79.67.68:443
98.4.227.199:443
84.78.128.76:2222
108.178.66.82:995
187.205.125.251:443
96.37.113.36:993
203.198.96.59:443
75.183.171.155:995
75.136.40.155:443
71.80.66.107:443
89.45.107.151:443
193.248.44.2:2222
96.227.127.13:443
65.131.64.201:995
47.28.131.209:443
70.164.39.91:443
37.106.123.0:443
174.19.122.177:2222
173.26.189.151:443
217.165.115.0:990
172.78.30.215:443
149.71.51.228:443
72.204.242.138:32102
72.204.242.138:53
72.204.242.138:50001
72.204.242.138:990
5.13.91.20:995
45.77.215.141:443
188.247.252.243:443
96.243.35.201:443
84.117.176.32:443
172.242.153.56:443
47.206.174.82:443
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments