MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1634d8e3e41040ba216ebf67d4c830cbd38c5e9c1f6623dcba630e2bd489d696. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 18


Intelligence 18 IOCs YARA 8 File information Comments

SHA256 hash: 1634d8e3e41040ba216ebf67d4c830cbd38c5e9c1f6623dcba630e2bd489d696
SHA3-384 hash: 477e6c5c348b90dc975d4f765e07abb48e1fb71ff4797abbabf28030eeb5ed66395e36840b04443d91ac4354e92cddc5
SHA1 hash: 68f2abf1273b79365c9fd65358409e4be8717125
MD5 hash: 9dbd549527f715d839bfcfb75f9a74f2
humanhash: blossom-kentucky-bulldog-triple
File name:1634d8e3e41040ba216ebf67d4c830cbd38c5e9c1f6623dcba630e2bd489d696.exe
Download: download sample
Signature QuasarRAT
File size:5'364'224 bytes
First seen:2026-03-29 03:52:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'853 x AgentTesla, 19'780 x Formbook, 12'304 x SnakeKeylogger)
ssdeep 24576:TzvislWlQT3HGQlJBPepkdPXk3+rxYa4tN3Sbty+PLqORKtOGyrLRNHEOXDrgCVn:TeOxrBGoNtsIKt/EnrT51loiVssKk
TLSH T1B34607242DEB102D7373AFA55FD8B8EF895FF6B32B0A64A9205103864723D41DD91B39
TrID 70.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.2% (.EXE) Win64 Executable (generic) (6522/11/2)
4.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter KnownSpotter
Tags:exe QuasarRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
134
Origin country :
CA CA
Vendor Threat Intelligence
Gathering data
Malware family:
ID:
1
File name:
1634d8e3e41040ba216ebf67d4c830cbd38c5e9c1f6623dcba630e2bd489d696.exe
Verdict:
Malicious activity
Analysis date:
2026-03-12 02:03:51 UTC
Tags:
quasar rat auto-reg crypto-regex pulsar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect quasar emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Creating a window
Сreating synchronization primitives
Connection attempt
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 evasive krypt obfuscated reconnaissance unsafe
Result
Gathering data
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-10-05T11:13:00Z UTC
Last seen:
2025-10-05T17:01:00Z UTC
Hits:
~10
Gathering data
Threat name:
ByteCode-MSIL.Hacktool.Aikaantivm
Status:
Malicious
First seen:
2025-10-05 17:04:27 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
27 of 36 (75.00%)
Threat level:
  1/5
Verdict:
malicious
Label(s):
quasarrat
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:quasar persistence spyware trojan
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Quasar RAT
Quasar family
Quasar payload
Unpacked files
SH256 hash:
1634d8e3e41040ba216ebf67d4c830cbd38c5e9c1f6623dcba630e2bd489d696
MD5 hash:
9dbd549527f715d839bfcfb75f9a74f2
SHA1 hash:
68f2abf1273b79365c9fd65358409e4be8717125
SH256 hash:
068f63496f1e1274d4da0ae3ff500bb578ee647c0fa79034634f9a6fbb751b94
MD5 hash:
6f5f873ec53ec6e4f5637d9022e5f623
SHA1 hash:
263405f894485d55cde00be4758619947b7e142d
Detections:
QuasarRAT cn_utf8_windows_terminal malware_windows_xrat_quasarrat MAL_QuasarRAT_May19_1 MAL_BackNet_Nov18_1 INDICATOR_EXE_Packed_Fody INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
SH256 hash:
a0af255ea4b09a8cdb995b8c6fd1075e46f098e23c2351c974e6ded9b8b620cf
MD5 hash:
c52a44933d17d576d4c97b4cb0545841
SHA1 hash:
092696fdcc034910aa02c94a5c93f4e1e86e0c50
Detections:
SUSP_NET_Large_Static_Array_In_Small_File_Jan24
SH256 hash:
8660d59a7b76b9ce348665cc8639dfa13c9b29c0398c1d1c12a8e3d8a58e611c
MD5 hash:
84c711f30130339455b4628122cfba15
SHA1 hash:
15eb16b9a6984f6410bcf7e4eafe360c04359566
Detections:
SUSP_NET_Large_Static_Array_In_Small_File_Jan24
SH256 hash:
4c9615496970ea84320e2a6e99f8fb828e3c7790384df5585d93fc368885d94e
MD5 hash:
50e6524b7ee9c2c93f5210b63cb1ca54
SHA1 hash:
3e296ec3bb24750833ea80515e6fb4c73874c91a
SH256 hash:
5a10f55297557ac56e4a66516b386115e58f46de09dd7387d31d14014edb22de
MD5 hash:
15a7d84b9e0a154b642e5657bd40ddde
SHA1 hash:
62416df0438e422bc34eb30378d1515557b6ec3a
Detections:
SUSP_NET_Large_Static_Array_In_Small_File_Jan24 HKTL_NET_GUID_Quasar
SH256 hash:
56f525e33494f4cd2a560a71cdf237303a3fb54a8fa44e1693eba35c9245c60a
MD5 hash:
07137e5cc4d5ecc95ca267c9dce042d4
SHA1 hash:
d82f5e3d718bc9172fcfe0e8c50cb20251762058
Malware family:
QuasarRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:telebot_framework
Author:vietdx.mb

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments