MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 035f44415228a4f73d1aab1a7f3ff75b8138f2b093586b49cf4faef32587863b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 7


Intelligence 7 IOCs YARA 4 File information Comments

SHA256 hash: 035f44415228a4f73d1aab1a7f3ff75b8138f2b093586b49cf4faef32587863b
SHA3-384 hash: c857f0985f503a72f5a91df3bc562278fd44b1ee1456376a6fa406fefdab5cbb7f8ce621c0f011e6e2d1917ba7a88a03
SHA1 hash: 477f6b0794bbae0c97c7fde59af91e09e09c63ad
MD5 hash: 8cbbbbc1432a5368e903073e28c54603
humanhash: kentucky-lion-batman-seven
File name:New Purchase Order-0304243220- SMART SOURCING INC.pdf____________________________________________________.lha
Download: download sample
Signature QuasarRAT
File size:404'195 bytes
First seen:2024-11-18 18:22:14 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 12288:ZctiiLWbhVZ8oYYyCFNCkSMlE7k0ZFCdrfhNVF:AqbhV+o+O3E7Hj+v
TLSH T18B8423C65EFC4B0B82411AB4ABF2B4855C74A135B93496AE5CEB67013794EF6310F3CA
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Magika rar
Reporter cocaman
Tags:lha QuasarRAT rar


Avatar
cocaman
Malicious email (T1566.001)
From: ""David R.E. Hale" <info@smart-sourcing.com>" (likely spoofed)
Received: "from [165.154.242.85] (unknown [165.154.242.85]) "
Date: "19 Nov 2024 02:20:38 +0800"
Subject: "Re: New Purchase Order-0304243220- SMART SOURCING INC."
Attachment: "New Purchase Order-0304243220- SMART SOURCING INC.pdf____________________________________________________.lha"

Intelligence


File Origin
# of uploads :
1
# of downloads :
112
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:New Purchase Order-0304243220- SMART SOURCING INC.pdf____________________________________________________.exe
File size:1'485'312 bytes
SHA256 hash: ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991
MD5 hash: c28ef8671a7f140f9385ab177e38844b
MIME type:application/x-dosexec
Signature QuasarRAT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
virus gates abel
Gathering data
Threat name:
ByteCode-MSIL.Downloader.Quasar
Status:
Malicious
First seen:
2024-11-18 18:22:17 UTC
File Type:
Binary (Archive)
Extracted files:
2
AV detection:
18 of 24 (75.00%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar botnet:chim discovery spyware trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Drops startup file
Quasar RAT
Quasar family
Quasar payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
aboushagor.ydns.eu:6542
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

QuasarRAT

rar 035f44415228a4f73d1aab1a7f3ff75b8138f2b093586b49cf4faef32587863b

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments