MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 04bf1d08978c90bfc106df524a0dcdd7b54f10bf2f3c336616a379ffd4c8048c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 04bf1d08978c90bfc106df524a0dcdd7b54f10bf2f3c336616a379ffd4c8048c
SHA3-384 hash: 0f3dd8119fabec148a488d3c4faedb307a66aca466e834cd4e6fa1a456ed5e14226771baf13a067082096c76740ce2cd
SHA1 hash: d28d0b00a098a21a39c2e2f0bd2ae2ca7cc8d481
MD5 hash: fab6bd4140c123b7b7a8e17b02c8c4a0
humanhash: nevada-blossom-beer-oregon
File name:msedge.vbs
Download: download sample
Signature QuasarRAT
File size:16'426 bytes
First seen:2025-07-09 02:21:00 UTC
Last seen:2025-07-09 07:47:19 UTC
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 384:VVvnuUcprxAyCs5Z+KmY+uwuoLuR2I4LT4FKTDhqQVf:LnuTt2CZ+ZMAYKf
Threatray 83 similar samples on MalwareBazaar
TLSH T11872EE39A7589FF00B6B32E4925B3D0130A51322EA35DD7EA4D7887C3F666148FA50EC
Magika vba
Reporter skocherhan
Tags:github-mwona QuasarRAT vbs


Avatar
skocherhan
https://github.com/mwona/dlikg/raw/refs/heads/main/msedge.vbs

Intelligence


File Origin
# of uploads :
2
# of downloads :
42
Origin country :
GB GB
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
obfuscate xtreme shell
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 obfuscated obfuscated powershell
Verdict:
Malware
YARA:
1 match(es)
Tags:
DeObfuscated Obfuscated T1059.005 VBScript WScript.Network
Threat name:
Script-WScript.Backdoor.Remcos
Status:
Malicious
First seen:
2025-07-09 02:21:24 UTC
File Type:
Text (VBS)
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar botnet:inmg1 defense_evasion discovery execution persistence spyware trojan
Behaviour
Kills process with taskkill
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Quasar RAT
Quasar family
Quasar payload
Malware Config
C2 Extraction:
194.37.81.104:4782
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments