MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 45eb700e6848f246fbb010d66d6669083970a9fb54fec74e66f7c1d6ff5ca5e4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 45eb700e6848f246fbb010d66d6669083970a9fb54fec74e66f7c1d6ff5ca5e4
SHA3-384 hash: 3b3c85c59afb933e0c95fa0f64aef3c481685c7f6c8e220677dce5b17e6e4f8791923f10b79bb3f0c781ffdc48af0c3a
SHA1 hash: f42c05bdc5139ba3c0fd5461e278a17f517683b7
MD5 hash: 56b635eebfdbf5a637e65ec0819abdae
humanhash: fillet-uniform-east-indigo
File name:chrom.bin
Download: download sample
Signature QuasarRAT
File size:448'000 bytes
First seen:2020-07-21 06:46:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 6144:gCaCubYRwKP3nu3hlKD9/iidyVnhVkN5GIdaCabcOUYJTMzW3G0/RSME3ZwP9ecZ:gCCYRJP3uiSZI6cYEW3t/RFIZgx
Threatray 155 similar samples on MalwareBazaar
TLSH 1994BF12A72AC25BD2F099BC2B605C7B4F309F87757291CB25ACC4A584EF78607D533A
Reporter JAMESWT_WT
Tags:Quasar QuasarRAT RAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
122
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Launching a process
Using the Windows Management Instrumentation requests
Sending an HTTP GET request
Creating a file in the %AppData% subdirectories
Creating a window
Forced shutdown of a system process
Connection attempt to an infection source
Enabling autorun with Startup directory
Unauthorized injection to a system process
Result
Threat name:
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 248504 Sample: chrom.bin Startdate: 21/07/2020 Architecture: WINDOWS Score: 100 44 Malicious sample detected (through community Yara rule) 2->44 46 Antivirus detection for dropped file 2->46 48 Antivirus / Scanner detection for submitted sample 2->48 50 9 other signatures 2->50 8 chrom.exe 4 2->8         started        12 HJdyTuap.exe 1 2->12         started        14 RegAsm.exe 2 2->14         started        process3 file4 28 C:\Users\user\chrom.exe, PE32 8->28 dropped 30 C:\Users\user\AppData\...\HJdyTuap.exe, PE32 8->30 dropped 32 C:\Users\user\chrom.exe:Zone.Identifier, ASCII 8->32 dropped 34 C:\Users\user\AppData\Local\...\chrom.exe.log, ASCII 8->34 dropped 52 Drops PE files to the user root directory 8->52 54 Drops PE files to the startup folder 8->54 56 Maps a DLL or memory area into another process 8->56 58 Hides that the sample has been downloaded from the Internet (zone.identifier) 8->58 16 RegAsm.exe 15 4 8->16         started        20 RegAsm.exe 2 12->20         started        22 conhost.exe 14->22         started        signatures5 process6 dnsIp7 36 bak505.duckdns.org 185.244.30.13, 444 DAVID_CRAIGGG Netherlands 16->36 38 ip-api.com 208.95.112.1, 49717, 80 TUT-ASUS United States 16->38 40 Hides that the sample has been downloaded from the Internet (zone.identifier) 16->40 42 Installs a global keyboard hook 16->42 24 schtasks.exe 1 16->24         started        signatures8 process9 process10 26 conhost.exe 24->26         started       
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2020-07-20 23:03:29 UTC
File Type:
PE (.Net Exe)
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
trojan spyware family:quasar
Behaviour
Suspicious use of AdjustPrivilegeToken
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of SetThreadContext
Looks up external IP address via web service
Drops startup file
Quasar RAT
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments