MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4f831bfdd5b3ab7f4194b6fd391cac71b70ba7ced3489eb2bdf78170eb1214e9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
QuasarRAT
Vendor detections: 16
| SHA256 hash: | 4f831bfdd5b3ab7f4194b6fd391cac71b70ba7ced3489eb2bdf78170eb1214e9 |
|---|---|
| SHA3-384 hash: | 384f1119dceaf24b69743dd9333516f47a9c28e0fecd81acd9da734d8cda5beae430402860ef4990becd3aef267dcd10 |
| SHA1 hash: | acb20c0c56da6085bc9508bd9fa6ee25d6ef92df |
| MD5 hash: | 4ae7fa0777d1d79d3ecb39c3b709189d |
| humanhash: | neptune-iowa-illinois-salami |
| File name: | built_crypted.exe |
| Download: | download sample |
| Signature | QuasarRAT |
| File size: | 5'348'352 bytes |
| First seen: | 2025-09-08 11:37:55 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 49152:uQHlEQpMxabpmQb6FEPcSUu0Juw5y5SfRfPfoTov7SjZszqg/3wwsIRF16Z0O: |
| Threatray | 108 similar samples on MalwareBazaar |
| TLSH | T14F36DC383BEAD0197273EE564AD474A7A95FB7B37B03944E206103464633941EEE2D3E |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe QuasarRAT |
Intelligence
File Origin
SEVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
62e2c7d860a0e3e0975c5b9da5193f9ab3ca6c56ef4eea46d17cc87ac4598b90
eb72d6dd2158ce9ad453f8ecfd5d6900cce588c196ae5806268cbaf3475848da
6e6e691a7f98fc4086f2bec28b34b2474ab783e9408c611e789a00107a24c227
7e4fe2503e3dd2028c230f5e0413423f1dbbcbda01a252d22c8ece243979e927
4f831bfdd5b3ab7f4194b6fd391cac71b70ba7ced3489eb2bdf78170eb1214e9
b6d7379d42b82f6e3943837a34a74936f230cdfbb3ff2d19f1517466492af7c2
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | DebuggerCheck__PEB |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.