MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 32f152ba15f960c54be6fa2ebaeadcb20211ae5aef0d3986dedc2578a7dc38a2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 32f152ba15f960c54be6fa2ebaeadcb20211ae5aef0d3986dedc2578a7dc38a2
SHA3-384 hash: bced87c6cfee845ec0ee30261a9eeb20476f6ebcd90b67212626b89176db24be9b1fb48cd074e032e4d44bf36f58ce72
SHA1 hash: 908a42a0f26dae156b5a0a73bc7a56fc144572df
MD5 hash: 78730d3b13c2fccc5408b14f62b01ed6
humanhash: illinois-five-robert-sad
File name:A.hta
Download: download sample
Signature QuasarRAT
File size:13'520 bytes
First seen:2026-03-31 12:46:57 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 384:Ya3Jne6BkOMKJCGFkDd6KFrwjSswoRkHge2MM62c7kOaq/JnFSWsu9d3zyQBziJZ:YI3Z
TLSH T12052992C09BDFA5893D9E316EB99F3276D461CAFD2B875172AB38C6DA0024C045DB4C7
Magika html
Reporter JAMESWT_WT
Tags:github-com--ashduasdoasdoasd hta QuasarRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
47
Origin country :
IT IT
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Score:
92.5%
Tags:
obfuscate xtreme sage
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 powershell
Verdict:
Malicious
File Type:
hta
First seen:
2026-03-31T10:13:00Z UTC
Last seen:
2026-04-01T00:47:00Z UTC
Hits:
~10
Detections:
Trojan-PSW.MSIL.Agent.sb Trojan-Downloader.Win32.Bitser.sb Trojan-Downloader.JS.SLoad.sb Trojan.MSIL.Agent.sb PDM:Exploit.Win32.Generic HEUR:Trojan-Banker.MSIL.ClipBanker.gen HEUR:Trojan.Win32.Generic HEUR:Trojan.MSIL.Convagent.gen Backdoor.MSIL.PulsarRAT.sb Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Html
Threat name:
Script-WScript.Trojan.Electryon
Status:
Malicious
First seen:
2026-03-30 17:00:18 UTC
File Type:
Text (VBS)
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar discovery dropper execution spyware trojan
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Contacts third-party web service commonly abused for C2
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Download via BitsAdmin
Downloads MZ/PE file
Quasar RAT
Quasar family
Quasar payload
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments