MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8638d79bd3e5370b1a1525cb43e9b92a5d99d58a947f4dc06c692f5f9a82bcd8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
QuasarRAT
Vendor detections: 16
| SHA256 hash: | 8638d79bd3e5370b1a1525cb43e9b92a5d99d58a947f4dc06c692f5f9a82bcd8 |
|---|---|
| SHA3-384 hash: | 619f06e5731871f661c4d72cb01f04b3a9485a397331656d2cf2429e65a8af932d7a9e5a0d2edd6f865d3d9353c231ef |
| SHA1 hash: | 30f9a1fee88b5b013aa6c8b660cade3336c58467 |
| MD5 hash: | adb998b734268635cec4ba838f70bffe |
| humanhash: | wisconsin-table-yellow-arkansas |
| File name: | z1Comprobante_de_Transferencia.exe |
| Download: | download sample |
| Signature | QuasarRAT |
| File size: | 4'020'224 bytes |
| First seen: | 2025-09-16 04:00:13 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'655 x AgentTesla, 19'464 x Formbook, 12'205 x SnakeKeylogger) |
| ssdeep | 98304:qPXVrkJ1Uqaou3SGxQWEMO7cfA7NbR0s7b9/B3:+XE1Uqaou3DgMadVR0E/l |
| Threatray | 258 similar samples on MalwareBazaar |
| TLSH | T1951633CD32A072EFD847C8344D580EA8D7152D7AA72B9143644774EBEA3E987DF190B2 |
| TrID | 28.5% (.EXE) Win64 Executable (generic) (10522/11/4) 17.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 13.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 12.2% (.EXE) Win32 Executable (generic) (4504/4/1) 5.6% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Magika | pebin |
| Reporter | |
| Tags: | exe QuasarRAT |
Intelligence
File Origin
BRVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Malware Config
asesorarcolom.crabdance.com:4898
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Check_Dlls |
|---|
| Rule name: | Costura_Protobuf |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies Costura and Protobuf in .NET assemblies, respectively for storing resources and (de)serialization. Seen together might indicate a suspect binary. |
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Thread |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | Detect_PowerShell_Obfuscation |
|---|---|
| Author: | daniyyell |
| Description: | Detects obfuscated PowerShell commands commonly used in malicious scripts. |
| Rule name: | FreddyBearDropper |
|---|---|
| Author: | Dwarozh Hoshiar |
| Description: | Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip. |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx_Custom |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Custom; outside of GIT |
| Rule name: | INDICATOR_EXE_Packed_Fody |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables manipulated with Fody |
| Rule name: | Indicator_MiniDumpWriteDump |
|---|---|
| Author: | Obscurity Labs LLC |
| Description: | Detects PE files and PowerShell scripts that use MiniDumpWriteDump either through direct imports or string references |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Windows executables referencing non-Windows User-Agents |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion |
| Rule name: | MAL_BackNet_Nov18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects BackNet samples |
| Reference: | https://github.com/valsov/BackNet |
| Rule name: | MAL_BackNet_Nov18_1_RID2D6D |
|---|---|
| Author: | Florian Roth |
| Description: | Detects BackNet samples |
| Reference: | https://github.com/valsov/BackNet |
| Rule name: | MAL_QuasarRAT_May19_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects QuasarRAT malware |
| Reference: | https://blog.ensilo.com/uncovering-new-activity-by-apt10 |
| Rule name: | MAL_QuasarRAT_May19_1_RID2E1E |
|---|---|
| Author: | Florian Roth |
| Description: | Detects QuasarRAT malware |
| Reference: | https://blog.ensilo.com/uncovering-new-activity-by-apt10 |
| Rule name: | Multifamily_RAT_Detection |
|---|---|
| Author: | Lucas Acha (http://www.lukeacha.com) |
| Description: | Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.