MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4f72467f5cb515fd7cfa3cdb38486d581310a70b053fb0494f6a8971ade19ada. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 4f72467f5cb515fd7cfa3cdb38486d581310a70b053fb0494f6a8971ade19ada
SHA3-384 hash: 899e1fe497183cbc20aec0e36b8eef3a71efcfbf6eada2954687431805852bc5187e53b47c18b3cbccb63bdb9c44dc04
SHA1 hash: 180b10e46ea18626001bbd38dbb552b9881159ff
MD5 hash: bde60dd34ea566808c2f7b6a74f9d0fe
humanhash: angel-ceiling-juliet-speaker
File name:4f72467f5cb515fd7cfa3cdb38486d581310a70b053fb0494f6a8971ade19ada
Download: download sample
Signature QuasarRAT
File size:4'480'512 bytes
First seen:2021-02-28 07:26:48 UTC
Last seen:2021-02-28 10:08:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'665 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 98304:umtS6SxY/f/aTSyqttmEblMMOommtS6SxY/f/aTSyqttmEblMMOo8RDPUkg:dtSjxY/HaTgmEbztSjxY/HaTgmEb8DPG
Threatray 44 similar samples on MalwareBazaar
TLSH A226335032F60EE9F965103EEE03723D10B1EA4CEC52B0AEDBE64B54F6807751B15B6A
Reporter JAMESWT_WT
Tags:QuasarRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
887
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4f72467f5cb515fd7cfa3cdb38486d581310a70b053fb0494f6a8971ade19ada
Verdict:
Suspicious activity
Analysis date:
2021-02-28 08:12:36 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file in the %temp% directory
Creating a process from a recently created file
Launching a process
Searching for the window
Changing a file
Connection attempt
Unauthorized injection to a recently created process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
50 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 359382 Sample: x4F1uS8nAq Startdate: 28/02/2021 Architecture: WINDOWS Score: 50 50 Malicious sample detected (through community Yara rule) 2->50 52 Antivirus / Scanner detection for submitted sample 2->52 54 Multi AV Scanner detection for submitted file 2->54 56 2 other signatures 2->56 8 x4F1uS8nAq.exe 5 12 2->8         started        process3 file4 36 C:\Users\user\AppData\Local\...\Qjmkvzsd.exe, PE32 8->36 dropped 38 C:\Users\user\AppData\Local\Temp\Fkfjqa.exe, PE32 8->38 dropped 40 C:\Users\user\AppData\...\Bjceiaavpu.exe, PE32 8->40 dropped 42 2 other files (1 malicious) 8->42 dropped 11 Qjmkvzsd.exe 8 8->11         started        15 Fkfjqa.exe 1 8->15         started        17 Bjceiaavpu.exe 8->17         started        19 4 other processes 8->19 process5 dnsIp6 44 127.0.0.1 unknown unknown 11->44 58 Antivirus detection for dropped file 11->58 60 Multi AV Scanner detection for dropped file 11->60 62 Machine Learning detection for dropped file 11->62 64 Hides that the sample has been downloaded from the Internet (zone.identifier) 11->64 21 WerFault.exe 15->21         started        23 WerFault.exe 17->23         started        46 192.168.2.1 unknown unknown 19->46 25 RdrCEF.exe 19->25         started        27 AcroRd32.exe 2 5 19->27         started        29 AcroRd32.exe 19->29         started        signatures7 process8 process9 31 RdrCEF.exe 25->31         started        34 RdrCEF.exe 25->34         started        dnsIp10 48 80.0.0.0 NTLGB United Kingdom 31->48
Threat name:
ByteCode-MSIL.Trojan.Tiggre
Status:
Malicious
First seen:
2021-02-27 02:12:00 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Checks processor information in registry
Modifies Internet Explorer settings
Modifies registry class
Opens file in notepad (likely ransom note)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Executes dropped EXE
Unpacked files
SH256 hash:
bd52ab1bdd0f3668fffade808d43dc5be0924d178a71f06192e663268fa83fd9
MD5 hash:
7a2a3c08b71b0bcdc4abc24d04c2adef
SHA1 hash:
7479cdfac87c208cc88c95e9a352034f6afd628d
SH256 hash:
0d2853b76cb428fcefac591786abb7ca3e01aa27a719d70ffb3f1f28491c9b90
MD5 hash:
c04301a306a0393e43d09b1e045a3ab0
SHA1 hash:
2a027e87787013a3f8b5b6e3f98dd4fdd40211dd
SH256 hash:
4f72467f5cb515fd7cfa3cdb38486d581310a70b053fb0494f6a8971ade19ada
MD5 hash:
bde60dd34ea566808c2f7b6a74f9d0fe
SHA1 hash:
180b10e46ea18626001bbd38dbb552b9881159ff
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments