MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 030c62f201281c0034102b3cab64490e51b0499a9b5fad498f1ded30b23dbf66. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 17


Intelligence 17 IOCs YARA 22 File information Comments

SHA256 hash: 030c62f201281c0034102b3cab64490e51b0499a9b5fad498f1ded30b23dbf66
SHA3-384 hash: 1b188a3560bcf246ca10161c09408ee2b4ec401d8c5dff90b70f6cfc1174410f16f4675f10a9a90a8f83f5affab9d516
SHA1 hash: e0ff02953d8aaa4d207f987d02c8db7416caa532
MD5 hash: 760c6669690fcc1347536be6b008d16c
humanhash: oxygen-robin-batman-bluebird
File name:760c6669690fcc1347536be6b008d16c.exe
Download: download sample
Signature QuasarRAT
File size:2'407'936 bytes
First seen:2025-05-12 05:51:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7d8db5847f7034371072945feb89f765 (1 x QuasarRAT)
ssdeep 49152:ZLPIy0ujEuTiQZ4g4TUY6MsEDhm+73spLzu32YjO:ZLPIzOT5ez6Ms47W/ux
Threatray 8 similar samples on MalwareBazaar
TLSH T168B5CF243BF1BF9EC402D8330599FD24121EBC586685AD6A3963AEE9027ED453CCB51F
TrID 40.3% (.EXE) Win64 Executable (generic) (10522/11/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter abuse_ch
Tags:exe QuasarRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
479
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
760c6669690fcc1347536be6b008d16c.exe
Verdict:
Malicious activity
Analysis date:
2025-05-12 05:53:19 UTC
Tags:
auto-sch crypto-regex

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a window
Сreating synchronization primitives
DNS request
Searching for synchronization primitives
Connection attempt
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
crypt fingerprint microsoft_visual_cc packed packed packer_detected zero zusy
Malware family:
VanHelsing Ransomware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1687450 Sample: sM0NI3CIIr.exe Startdate: 12/05/2025 Architecture: WINDOWS Score: 100 38 api.e2ee.tel 2->38 40 bg.microsoft.map.fastly.net 2->40 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 Multi AV Scanner detection for submitted file 2->48 50 7 other signatures 2->50 9 sM0NI3CIIr.exe 2->9         started        12 sM0NI3CIIr.exe 2->12         started        signatures3 process4 signatures5 52 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 9->52 54 Writes to foreign memory regions 9->54 56 Allocates memory in foreign processes 9->56 14 vbc.exe 2 9->14         started        18 cmd.exe 1 9->18         started        58 Injects a PE file into a foreign processes 12->58 20 cmd.exe 1 12->20         started        22 vbc.exe 3 12->22         started        process6 dnsIp7 42 api.e2ee.tel 37.114.63.40, 4782, 49687, 49689 DE-FIRSTCOLOwwwfirst-colonetDE Germany 14->42 60 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->60 24 WerFault.exe 4 14->24         started        62 Uses schtasks.exe or at.exe to add and modify task schedules 18->62 26 MpCmdRun.exe 1 18->26         started        28 conhost.exe 18->28         started        30 schtasks.exe 1 18->30         started        32 conhost.exe 20->32         started        34 schtasks.exe 1 20->34         started        signatures8 process9 process10 36 conhost.exe 26->36         started       
Threat name:
Win32.Backdoor.Quasar
Status:
Malicious
First seen:
2025-05-08 03:50:15 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
29 of 37 (78.38%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar botnet:office04 discovery spyware trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Uses the VBS compiler for execution
Quasar RAT
Quasar family
Quasar payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
api.e2ee.tel:4782
Unpacked files
SH256 hash:
030c62f201281c0034102b3cab64490e51b0499a9b5fad498f1ded30b23dbf66
MD5 hash:
760c6669690fcc1347536be6b008d16c
SHA1 hash:
e0ff02953d8aaa4d207f987d02c8db7416caa532
SH256 hash:
6011b72eb3712734f2d2de63b4f91f28603442e7f70588359b4b07eae2ebfda4
MD5 hash:
0012e55cb71a33215a307bc2fca52013
SHA1 hash:
b943c9c8dc3d367b51872762a2a6ed6b0cb9ec67
Detections:
QuasarRAT cn_utf8_windows_terminal malware_windows_xrat_quasarrat MAL_QuasarRAT_May19_1 MAL_BackNet_Nov18_1 INDICATOR_EXE_Packed_Fody INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
SH256 hash:
e16588ab387aa94a4624865ef59e87e529f1e8adb5c1bf2d854378ba135f495b
MD5 hash:
5551f56e7e702f0e0889f1033f86c882
SHA1 hash:
1774dab91a126e1e456df94dbae3b23ac3e57bfd
SH256 hash:
4c9615496970ea84320e2a6e99f8fb828e3c7790384df5585d93fc368885d94e
MD5 hash:
50e6524b7ee9c2c93f5210b63cb1ca54
SHA1 hash:
3e296ec3bb24750833ea80515e6fb4c73874c91a
SH256 hash:
c9736bed57d137a0bd4a454a70436020312db5a365bdd243037e766695c18ccd
MD5 hash:
41b34eab1585d5381c56730b93dd1310
SHA1 hash:
510b640517342dbcc40c81b63db23fa1444a71ed
SH256 hash:
ad64ffa4d732a4ecbf96d1b89164f741f20a83dad94fa457de94b410801ca0b9
MD5 hash:
35964106c8117525d1bb0af9636a7e3e
SHA1 hash:
566eb9270de32ad666322db6c85ee492d994a8fe
SH256 hash:
bc0243134c93c55ea105d0e9c2a43b6030e973290d0a061cf3a61986a2268a88
MD5 hash:
d2edde626c241549eab636aa87fb5d38
SHA1 hash:
8d836febd477b3ec44cc37f4f0aecdaa1d7db788
Malware family:
QuasarRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_Dlls
Rule name:Costura_Protobuf
Author:@bartblaze
Description:Identifies Costura and Protobuf in .NET assemblies, respectively for storing resources and (de)serialization. Seen together might indicate a suspect binary.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_EXE_Packed_Fody
Author:ditekSHen
Description:Detects executables manipulated with Fody
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL
Author:ditekSHen
Description:Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
Rule name:MAL_BackNet_Nov18_1
Author:Florian Roth (Nextron Systems)
Description:Detects BackNet samples
Reference:https://github.com/valsov/BackNet
Rule name:MAL_BackNet_Nov18_1_RID2D6D
Author:Florian Roth
Description:Detects BackNet samples
Reference:https://github.com/valsov/BackNet
Rule name:MAL_QuasarRAT_May19_1
Author:Florian Roth (Nextron Systems)
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:MAL_QuasarRAT_May19_1_RID2E1E
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:pe_imphash
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::FreeSid
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::CheckTokenMembership
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessA
KERNEL32.dll::CreateProcessW
KERNEL32.dll::OpenProcess
KERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleWindow
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW
SHLWAPI.dll::PathRemoveFileSpecW
KERNEL32.dll::FindFirstFileW

Comments