MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e83d13fcdc0f133482d558c8ce25b45a491ba3aff13849ce8169f05bb4972f0d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 8


Intelligence 8 IOCs YARA 9 File information Comments

SHA256 hash: e83d13fcdc0f133482d558c8ce25b45a491ba3aff13849ce8169f05bb4972f0d
SHA3-384 hash: 8cc6bd0280deb1271106dec40deeb7228ec67aa190d96985f89867ac57c7fd9bba6a48a3083011be0150a0b28b1976f6
SHA1 hash: 6f46b5386bb1cdcf83861666ddeb2be02ae7ee5f
MD5 hash: a4a92cfdc1b3a949970eb6f5b20e1f21
humanhash: solar-seven-bacon-fanta
File name:77-Venom.exe
Download: download sample
Signature QuasarRAT
File size:590'336 bytes
First seen:2020-08-15 22:47:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:D8fGrBIgrx8kFYLTiMkbLJFiJaEpO5MGb41jJXJbX29zjQQhtXt29dGy3V8/GV0R:ZPx7FYPiMBqMfl5bm9zjxP29shT
Threatray 83 similar samples on MalwareBazaar
TLSH 2CC48D2073E49E5AE5AE077EF43159119BB1FC47B726F78B0E8560AD2C233819C41BA7
Reporter James_inthe_box
Tags:exe QuasarRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
101
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Using the Windows Management Instrumentation requests
DNS request
Sending an HTTP GET request
Creating a file in the Windows subdirectories
Launching a process
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Sending a UDP request
Setting a keyboard event handler
Creating a window
Creating a file in the %AppData% subdirectories
Sending a custom TCP request
Launching cmd.exe command interpreter
Creating a process with a hidden window
Creating a file in the %temp% directory
Running batch commands
Creating a file
Unauthorized injection to a recently created process
Enabling autorun by creating a file
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Contains functionality to hide user accounts
Disables Windows Defender (via service or powershell)
Drops executables to the windows directory (C:\Windows) and starts them
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Protects its processes via BreakOnTermination flag
Query firmware table information (likely to detect VMs)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 268463 Sample: 77-Venom.exe Startdate: 17/08/2020 Architecture: WINDOWS Score: 100 54 cdn.onenote.net 2->54 72 Malicious sample detected (through community Yara rule) 2->72 74 Yara detected Quasar RAT 2->74 76 .NET source code references suspicious native API functions 2->76 78 5 other signatures 2->78 9 77-Venom.exe 16 9 2->9         started        14 77-Venom.exe 2->14         started        signatures3 process4 dnsIp5 56 ip-api.com 208.95.112.1, 49730, 49731, 80 TUT-ASUS United States 9->56 58 91.134.207.16, 49738, 80 OVHFR France 9->58 60 2 other IPs or domains 9->60 44 C:\Windows\SysWOW64\SubDir\Discord.exe, PE32 9->44 dropped 46 C:\Users\user\AppData\...\77-Venom.exe.log, ASCII 9->46 dropped 80 Drops executables to the windows directory (C:\Windows) and starts them 9->80 82 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->82 84 Disables Windows Defender (via service or powershell) 9->84 16 Discord.exe 14 4 9->16         started        20 powershell.exe 9->20         started        22 powershell.exe 23 9->22         started        24 13 other processes 9->24 file6 signatures7 process8 dnsIp9 48 178.33.23.183, 49732, 49733, 49734 OVHFR France 16->48 50 192.168.2.1 unknown unknown 16->50 52 ip-api.com 16->52 62 Protects its processes via BreakOnTermination flag 16->62 64 Machine Learning detection for dropped file 16->64 66 Hides that the sample has been downloaded from the Internet (zone.identifier) 16->66 68 Installs a global keyboard hook 16->68 26 schtasks.exe 16->26         started        70 Query firmware table information (likely to detect VMs) 20->70 28 conhost.exe 20->28         started        30 conhost.exe 22->30         started        32 conhost.exe 24->32         started        34 conhost.exe 24->34         started        36 conhost.exe 24->36         started        38 7 other processes 24->38 signatures10 process11 process12 40 conhost.exe 26->40         started        42 conhost.exe 30->42         started       
Threat name:
ByteCode-MSIL.Backdoor.Zapchast
Status:
Malicious
First seen:
2020-08-15 11:27:42 UTC
File Type:
PE (.Net Exe)
Extracted files:
20
AV detection:
28 of 29 (96.55%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Contains code to disable Windows Defender
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Certutil_Decode_OR_Download
Author:Florian Roth
Description:Certutil Decode
Reference:Internal Research
Rule name:CN_disclosed_20180208_KeyLogger_1
Author:Florian Roth
Description:Detects malware from disclosed CN malware set
Reference:https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details
Rule name:MAL_Envrial_Jan18_1
Author:Florian Roth
Description:Detects Encrial credential stealer malware
Reference:https://twitter.com/malwrhunterteam/status/953313514629853184
Rule name:MAL_QuasarRAT_May19_1
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:Quasar_RAT_1
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:Quasar_RAT_2
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:RDPWrap
Author:@bartblaze
Description:Identifies RDP Wrapper, sometimes used by attackers to maintain persistence.
Reference:https://github.com/stascorp/rdpwrap
Rule name:Vermin_Keylogger_Jan18_1
Author:Florian Roth
Description:Detects Vermin Keylogger
Reference:https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/
Rule name:xRAT_1
Author:Florian Roth
Description:Detects Patchwork malware
Reference:https://goo.gl/Pg3P4W

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments