MalwareBazaar Database
This page shows some basic information the YARA rule WIN_WebSocket_Base64_C2_20250726
including corresponding malware samples.
Database Entry
YARA Rule: | WIN_WebSocket_Base64_C2_20250726 |
---|---|
Author: | dogsafetyforeverone |
Description: | Detects configuration strings used by malware to specify WebSocket command-and-control endpoints inside Base64-encoded data. It looks for prefixes such as '#ws://' or '#wss://' that were found in QuasarRAT configuration data. |
Firstseen: | 2025-08-02 11:34:41 UTC |
Lastseen: | 2025-09-26 06:42:01 UTC |
Sightings: | 73 |
Malware Samples
The table below shows all malware samples that matching this particular YARA rule (max 1000).
Firstseen (UTC) | SHA256 hash | Tags | Signature | Reporter |
---|