MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fe7c6af8a14af582c3f81749652b9c1ea6c0c002bb181c9ffb154eae609e6458. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 7


Intelligence 7 IOCs YARA 3 File information Comments

SHA256 hash: fe7c6af8a14af582c3f81749652b9c1ea6c0c002bb181c9ffb154eae609e6458
SHA3-384 hash: bbbf1139fd23027a82068784902e9f987c15a57baa9b0add1e6ef3402080accc4b44724af4868b0a87e1c136eec48b8e
SHA1 hash: e2795ee5fd02713fd42bbcf2cd0de4c9434475be
MD5 hash: ff19670725eaf5df6f3d2ca656d3db27
humanhash: mirror-oven-mars-social
File name:Adobe Cloud Certificate 292433.wsf
Download: download sample
Signature Quakbot
File size:7'149 bytes
First seen:2023-02-14 14:56:28 UTC
Last seen:Never
File type: pem
MIME type:text/html
ssdeep 192:H1vlVFYlBjrBE3+bg/XiBaUAEnAsNT084n/qf1oD7:HpxYlBjU+bMJUAL84nC2
TLSH T147E19D470F51AC180C9AD9704339A0705A8F86373396DA1ADE6A75C53E9C3C66FBF358
Reporter pr0xylife
Tags:1676370608 azd PEM Qakbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
RU RU
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:QbotStuff
Author:anonymous
Rule name:SUSP_certificate_payload
Author:Didier Stevens, Florian Roth
Description:Detects payloads that pretend to be certificates
Reference:https://blog.nviso.be/2018/08/02/powershell-inside-a-certificate-part-3/
Rule name:SUSP_certificate_payload_RID3087
Author:Didier Stevens, Florian Roth
Description:Detects payloads that pretend to be certificates
Reference:https://blog.nviso.be/2018/08/02/powershell-inside-a-certificate-part-3/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments