MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3b02f2d57c40d4971283bf17b58de4574227c952b555590ef99a64d6b3faca00. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 3b02f2d57c40d4971283bf17b58de4574227c952b555590ef99a64d6b3faca00
SHA3-384 hash: 7c1d699c9bf0f107663440c094f63c232fa60caddd75d373d0cf9996583ca7e397dbff57eb190b313cf91dec6f3bd9cb
SHA1 hash: 50a4ec61a30f0e3c68db9ce2e32c4928c64e8722
MD5 hash: 02172018da16d4d33a7d7c214f078b34
humanhash: idaho-potato-floor-gee
File name:3b02f2d57c40d4971283bf17b58de4574227c952b555590ef99a64d6b3faca00
Download: download sample
Signature QuasarRAT
File size:486'912 bytes
First seen:2020-07-06 06:53:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:EF5XnmyAEHmOLWPHNCeEvdKOGrSrdrRGo:ELbXLSHsFGGCo
Threatray 18 similar samples on MalwareBazaar
TLSH E5A4F18B33A93DABC06E94780B6910835FF0A213A593E7D96CD438D7D6BAB570900DD7
Reporter JAMESWT_WT
Tags:QuasarRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file
DNS request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Sending an HTTP GET request
Creating a file in the %AppData% subdirectories
Launching a process
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Blocking the Windows Security Center notifications
Blocking the User Account Control
Blocking the Windows Defender launch
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun with Startup directory
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-07-06 06:34:19 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments