MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1b7d7515f98891cf08164a7469bb9c9f3133e7834cfe99d55094594ca330e982. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 10 File information Comments

SHA256 hash: 1b7d7515f98891cf08164a7469bb9c9f3133e7834cfe99d55094594ca330e982
SHA3-384 hash: 94769b226bc4541f472cd250294b30a5ca2697140efb3168b24548683ed3c48e2f134312d28ddd9da086dd0fbc001893
SHA1 hash: 7fd9fabb206082c75a0719cadab7287097234aa6
MD5 hash: a6000dc2d7e32df066079f4a2ff91e35
humanhash: cold-washington-neptune-cold
File name:a6000dc2d7e32df066079f4a2ff91e35.exe
Download: download sample
Signature QuasarRAT
File size:7'717'865 bytes
First seen:2021-06-20 03:06:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c9adc83b45e363b21cd6b11b5da0501f (82 x ArkeiStealer, 60 x RecordBreaker, 46 x RedLineStealer)
ssdeep 98304:mAI+qSlex5u6+tLvHREJTSeEehw1F+cgyThOMYYYjyDAbsr9CjdiECMFKHq3/Iub:VtqieGeJmeDolVvwjoY0qMHLjixF7gzW
Threatray 107 similar samples on MalwareBazaar
TLSH EA763375A6714A75E4236872C243D3F37632F7682F2A118EF1CE694C2D3734644BA2AD
Reporter abuse_ch
Tags:exe QuasarRAT RAT


Avatar
abuse_ch
QuasarRAT C2:
198.23.212.148:4782

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
198.23.212.148:4782 https://threatfox.abuse.ch/ioc/137432/

Intelligence


File Origin
# of uploads :
1
# of downloads :
195
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a6000dc2d7e32df066079f4a2ff91e35.exe
Verdict:
No threats detected
Analysis date:
2021-06-20 03:07:56 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT Quasar
Detection:
malicious
Classification:
troj.adwa.expl.evad
Score:
90 / 100
Signature
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Drops PE files to the startup folder
Drops VBS files to the startup folder
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Potential malicious VBS script found (suspicious strings)
PowerShell case anomaly found
Powershell drops PE file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Drops script at startup location
Sigma detected: Suspicious Csc.exe Source File Folder
Sigma detected: Suspicious Process Start Without DLL
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 437230 Sample: HRXoZLG4ym.exe Startdate: 20/06/2021 Architecture: WINDOWS Score: 90 94 u.heatmap.it 2->94 96 pettbull.ddns.net 2->96 98 22 other IPs or domains 2->98 118 Multi AV Scanner detection for domain / URL 2->118 120 Found malware configuration 2->120 122 Malicious sample detected (through community Yara rule) 2->122 124 16 other signatures 2->124 10 HRXoZLG4ym.exe 17 11 2->10         started        13 System32.exe 2->13         started        signatures3 process4 file5 72 C:\Users\user\AppData\Roaming\Host.exe, PE32 10->72 dropped 74 C:\Users\user\AppData\Roaming\svchost.vbs, UTF-8 10->74 dropped 76 C:\Program Files (x86)\...\Uninstall.exe, PE32 10->76 dropped 78 C:\Program Files (x86)\...\Setup.exe, PE32 10->78 dropped 15 Host.exe 1 10->15         started        18 wscript.exe 2 10->18         started        21 Setup.exe 2 10->21         started        process6 file7 144 PowerShell case anomaly found 15->144 23 RegSvcs.exe 15 2 15->23         started        27 powershell.exe 14 15->27         started        66 C:\Users\user\AppData\Local\Tempbehaviorgraphood.xml, exported 18->66 dropped 30 MSBuild.exe 12 18->30         started        68 C:\Users\user\AppData\Local\...\Setup.tmp, PE32 21->68 dropped 32 Setup.tmp 21->32         started        signatures8 process9 dnsIp10 106 pettbull.ddns.net 198.23.212.148, 4782, 49718, 49737 AS-COLOCROSSINGUS United States 23->106 108 tools.keycdn.com 185.172.148.96, 443, 49723, 49738 PROINITYPROINITYDE Germany 23->108 114 3 other IPs or domains 23->114 126 May check the online IP address of the machine 23->126 128 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 23->128 130 Hides that the sample has been downloaded from the Internet (zone.identifier) 23->130 80 C:\Users\user\AppData\...\System32.exe, PE32 27->80 dropped 132 Drops PE files to the startup folder 27->132 134 Powershell drops PE file 27->134 34 conhost.exe 27->34         started        82 C:\Users\user\AppData\...\Windows Update.vbs, ASCII 30->82 dropped 84 C:\Users\user\AppData\...\i2wj3d30.cmdline, UTF-8 30->84 dropped 136 Potential malicious VBS script found (suspicious strings) 30->136 138 Drops VBS files to the startup folder 30->138 140 Writes to foreign memory regions 30->140 142 Injects a PE file into a foreign processes 30->142 36 InstallUtil.exe 30->36         started        39 csc.exe 30->39         started        42 conhost.exe 30->42         started        110 offers.systweak.com 5.79.122.22, 49730, 49806, 80 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 32->110 112 www.duplicatefilesfixer.com 167.172.155.182, 443, 49726, 49728 DIGITALOCEAN-ASNUS United States 32->112 116 2 other IPs or domains 32->116 86 C:\Users\user\AppData\Local\...\isxdl.dll, PE32 32->86 dropped 88 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 32->88 dropped 90 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 32->90 dropped 92 16 other files (none is malicious) 32->92 dropped 44 DuplicateFilesFixer.exe 32->44         started        46 taskkill.exe 32->46         started        48 taskkill.exe 32->48         started        50 8 other processes 32->50 file11 signatures12 process13 dnsIp14 100 pettbull.ddns.net 36->100 70 C:\Users\user\AppData\Local\...\i2wj3d30.dll, PE32 39->70 dropped 52 cvtres.exe 39->52         started        102 192.168.2.1 unknown unknown 44->102 104 www.duplicatefilesfixer.com 44->104 54 conhost.exe 46->54         started        56 conhost.exe 48->56         started        58 conhost.exe 50->58         started        60 conhost.exe 50->60         started        62 conhost.exe 50->62         started        64 5 other processes 50->64 file15 process16
Threat name:
Win32.Dropper.Dapato
Status:
Malicious
First seen:
2021-06-17 02:03:00 UTC
AV detection:
17 of 29 (58.62%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:asyncrat family:quasar botnet:god021 discovery rat spyware trojan
Behaviour
Kills process with taskkill
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks installed software on the system
Looks up external IP address via web service
Drops startup file
Loads dropped DLL
Executes dropped EXE
Async RAT payload
AsyncRat
Quasar Payload
Quasar RAT
Malware Config
C2 Extraction:
pettbull.ddns.net:4782
pettbull.ddns.net:6606
pettbull.ddns.net:7707
pettbull.ddns.net:8808
Unpacked files
SH256 hash:
ce224073b68a7222f5f26a62ecc2a23ef26dcf5678a7c03f22ca4ef2b4d6857b
MD5 hash:
c701757029d83b6b628515550f53e93b
SHA1 hash:
e68c705f87b3c449164c0319a7bc86cb7db6a54c
Detections:
win_asyncrat_w0
SH256 hash:
1691e70820365b2b2528e4d5180eb4a70d60d18075d90ea03d290616fa306ce1
MD5 hash:
5f0f0e1520c310f3cfd112efc45c709d
SHA1 hash:
87004dcce385b12bc96e650d829b9b6382c93641
SH256 hash:
814f21f8c2befba504e592e3396be7454f93013939325cc7fbad5c38f022b395
MD5 hash:
5b7e0c747b948e4f0f1c45e74a098ef5
SHA1 hash:
525166949e239c884c14a750592a4a8cb5a10692
SH256 hash:
3fe966e21625f83eccdcc49762305a16e6c488397b4e08a98e1be48d93c3a571
MD5 hash:
884c22791622cbd6edc8ad0dfcea87f2
SHA1 hash:
8b2b539c86f49597a05a289fda4ac27b2fd1c177
SH256 hash:
7ca66a446f95f060b7996640f71442d11e6f0bdbef747855275ce726d0f549ef
MD5 hash:
001b00a49442b07e1ea0321fa7c997f9
SHA1 hash:
03a31887e7f4b7420ef4ee63db2783e6f3be6f35
SH256 hash:
ca5c73c2228b1ea5673cbfa2514313aa55f20fb0f8e044a6e4a8c583dc3c2840
MD5 hash:
afb39b03f798990a5ce72c605542c2dd
SHA1 hash:
c0bd12610159ce0f2ecf31b5fbd5a876aeff21d0
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
44b8e6a310564338968158a1ed88c8535dece20acb06c5e22d87953c261dfed0
MD5 hash:
9c8886759e736d3f27674e0fff63d40a
SHA1 hash:
ceff6a7b106c3262d9e8496d2ab319821b100541
SH256 hash:
f45475f9fbee2b122ba48a35f1e047e8c7ff272a50606d9c4f13919a973d52ad
MD5 hash:
fce02537e6d02c9cb37b1f7fed1a410c
SHA1 hash:
008977ce46353b0ab0f4a7f33d70e7b6242db84d
SH256 hash:
1b7d7515f98891cf08164a7469bb9c9f3133e7834cfe99d55094594ca330e982
MD5 hash:
a6000dc2d7e32df066079f4a2ff91e35
SHA1 hash:
7fd9fabb206082c75a0719cadab7287097234aa6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CAP_HookExKeylogger
Author:Brian C. Bell -- @biebsmalwareguy
Reference:https://github.com/DFIRnotes/rules/blob/master/CAP_HookExKeylogger.yar
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_GENInfoStealer
Author:ditekSHen
Description:Detects executables containing common artifcats observed in infostealers
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MALWARE_Win_QuasarStealer
Author:ditekshen
Description:Detects Quasar infostealer
Rule name:MAL_QuasarRAT_May19_1
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:pe_imphash
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Vermin_Keylogger_Jan18_1
Author:Florian Roth
Description:Detects Vermin Keylogger
Reference:https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments