MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 185ba54811bf367e51e498ccb60534544790abe9d757a5fd2fdd4ff94c2cd912. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 185ba54811bf367e51e498ccb60534544790abe9d757a5fd2fdd4ff94c2cd912
SHA3-384 hash: f48d28508d4ad19b1f810a29b0815f671fedefb6f454f50734a89a89fc254f6d77171446d4834e2cc4b8ef35afce2b0a
SHA1 hash: 59d4a3764ddb86e99f4cf738b47a8fbac90225cc
MD5 hash: ee4b4ee2e0170b4ae098c8bcf37c2226
humanhash: fix-delta-fourteen-violet
File name:Xeron_Scan2021002111002.doc
Download: download sample
Signature QuasarRAT
File size:2'780'270 bytes
First seen:2021-01-07 10:05:08 UTC
Last seen:Never
File type:Word file doc
MIME type:text/rtf
ssdeep 49152:23F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3M:R
TLSH B3D501AD43129A8DC2E34FE58F16741AB63FF75418D6253AF6ECCBB82E321D1E410586
Reporter abuse_ch
Tags:doc QuasarRAT


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: sineicom.co.jp
Sending IP: 119.245.208.68
From: FedEx <yasu-sema@sineicom.co.jp>
Subject: Unable to deliver your parcel
Attachment: Xeron_Scan2021002111002.zip (contains "Xeron_Scan2021002111002.doc")

Intelligence


File Origin
# of uploads :
1
# of downloads :
209
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Xeron_Scan2021002111002.doc
Verdict:
Malicious activity
Analysis date:
2021-01-07 10:06:24 UTC
Tags:
ole-embedded exploit CVE-2017-11882 trojan rat quasar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
File type:
application/msword
Has a screenshot:
False
Contains macros:
False
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a window
DNS request
Sending an HTTP GET request
Sending a custom TCP request by exploiting the app vulnerability
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
troj.adwa.expl.evad
Score:
100 / 100
Signature
Connects to a URL shortener service
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Drops PE files to the startup folder
Drops PE files to the user root directory
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Suspicious Program Location Process Starts
Tries to delay execution (extensive OutputDebugStringW loop)
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 336928 Sample: Xeron_Scan2021002111002.doc Startdate: 07/01/2021 Architecture: WINDOWS Score: 100 58 Multi AV Scanner detection for dropped file 2->58 60 Multi AV Scanner detection for submitted file 2->60 62 Yara detected Quasar RAT 2->62 64 10 other signatures 2->64 7 EQNEDT32.EXE 13 2->7         started        12 69577.exe 2->12         started        14 69577.exe 2->14         started        16 4 other processes 2->16 process3 dnsIp4 52 bit.ly 67.199.248.10, 49167, 80 GOOGLE-PRIVATE-CLOUDUS United States 7->52 54 bitbucket.org 104.192.141.1, 443, 49168 AMAZON-02US United States 7->54 56 2 other IPs or domains 7->56 48 C:\Users\user\AppData\...\crypted[1].txt, PE32 7->48 dropped 50 C:\Users\Public\69577.exe, PE32 7->50 dropped 72 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 7->72 18 69577.exe 3 1 7->18         started        74 Creates autostart registry keys with suspicious names 12->74 76 Creates multiple autostart registry keys 12->76 32 4 other processes 12->32 22 69577.exe 14->22         started        24 69577.exe 14->24         started        34 3 other processes 14->34 26 69577.exe 16->26         started        28 69577.exe 16->28         started        30 69577.exe 16->30         started        36 12 other processes 16->36 file5 signatures6 process7 file8 46 C:\Users\user\AppData\Roaming\...\69577.exe, PE32 18->46 dropped 66 Creates an undocumented autostart registry key 18->66 68 Drops PE files to the startup folder 18->68 70 Tries to delay execution (extensive OutputDebugStringW loop) 18->70 38 69577.exe 18->38         started        40 69577.exe 18->40         started        42 69577.exe 18->42         started        44 2 other processes 18->44 signatures9 process10
Threat name:
Document-Office.Exploit.Heuristic
Status:
Malicious
First seen:
2021-01-07 10:06:07 UTC
AV detection:
8 of 46 (17.39%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence
Behaviour
Launches Equation Editor
Modifies Internet Explorer settings
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Checks processor information in registry
Enumerates system info in registry
Office loads VBA resources, possible macro or embedded object present
Drops file in Windows directory
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Drops startup file
Loads dropped DLL
Blocklisted process makes network request
Executes dropped EXE
Modifies WinLogon for persistence
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_RTF_EXPLOIT_CVE_2017_8759_2
Author:ditekSHen
Description:detects CVE-2017-8759 weaponized RTF documents.
Rule name:INDICATOR_RTF_MalVer_Objects
Author:ditekSHen
Description:Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

QuasarRAT

Word file doc 185ba54811bf367e51e498ccb60534544790abe9d757a5fd2fdd4ff94c2cd912

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments