MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 49ad02ecd997150873813d2b6cf825d1eaa9e1cb85aa92e0bd894d8c1decc280. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 3


Intelligence 3 IOCs YARA 2 File information Comments

SHA256 hash: 49ad02ecd997150873813d2b6cf825d1eaa9e1cb85aa92e0bd894d8c1decc280
SHA3-384 hash: 569ea94334547a1dd8383709b5512b052ac2cdff1f2e36e7850acecabf8f145bf114e0c13a78894d5f3b7fcbff131387
SHA1 hash: 3b04e2898008a76024976bc54e1015c9bfcbe5a0
MD5 hash: e4499c35fd27951349987045d8412ef7
humanhash: happy-mars-don-fish
File name:49ad02ecd997150873813d2b6cf825d1eaa9e1cb85aa92e0bd894d8c1decc280
Download: download sample
Signature QuasarRAT
File size:809'472 bytes
First seen:2020-03-23 18:48:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 80b94494f3086d0fbee1e192c23f9456 (1 x QuasarRAT, 1 x CoinMiner.XMRig)
ssdeep 12288:1Wq2YjOIAo73vEgVE++dHUh4xD/B7evQfJzSAPJrztJh48gmoqqRdUS4:43YjOcM5++dDxD/8vaVPJ1jL9oqKyX
Threatray 1'646 similar samples on MalwareBazaar
TLSH A1057D26F3D04837D2B32A3D8D5F93649826BE523D3876862BE81D4C9F3D64139262D7
Reporter Marco_Ramilli
Tags:exe QuasarRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
101
Origin country :
n/a
Vendor Threat Intelligence

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MSILStealer
Author:https://github.com/hwvs
Description:Detects strings from C#/VB Stealers and QuasarRat
Reference:https://github.com/quasar/QuasarRAT
Rule name:Quasar_RAT_1
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

QuasarRAT

Executable exe 49ad02ecd997150873813d2b6cf825d1eaa9e1cb85aa92e0bd894d8c1decc280

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
SHELL_APIManipulates System Shellshell32.dll::ShellExecuteExA
shell32.dll::ShellExecuteA
shell32.dll::SHGetFileInfoA
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryExA
kernel32.dll::LoadLibraryA
kernel32.dll::GetSystemInfo
kernel32.dll::GetStartupInfoA
kernel32.dll::GetDiskFreeSpaceA
kernel32.dll::GetCommandLineA
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateFileA
kernel32.dll::FindFirstFileA
kernel32.dll::GetTempPathA
version.dll::GetFileVersionInfoSizeA
version.dll::GetFileVersionInfoA
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegOpenKeyExA
advapi32.dll::RegQueryInfoKeyA
advapi32.dll::RegQueryValueExA
WIN_USER_APIPerforms GUI Actionsuser32.dll::ActivateKeyboardLayout
user32.dll::CreateMenu
user32.dll::FindWindowA
user32.dll::PeekMessageA
user32.dll::CreateWindowExA

Comments