MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6230049aca6cf64db37be7c35946481041629c4f40311f5a39ba45303bd992e7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
QuasarRAT
Vendor detections: 17
| SHA256 hash: | 6230049aca6cf64db37be7c35946481041629c4f40311f5a39ba45303bd992e7 |
|---|---|
| SHA3-384 hash: | 786dd3243ef3835adcfd8ce99977d8732949bf6d6624336c6d33e5b3d2c1389b0034f615344aadecd2d665b9951c6247 |
| SHA1 hash: | 6862b41edee8d724004e9ada90d21289c3d45bef |
| MD5 hash: | 0994bce735fc8bb848d1431edf6338da |
| humanhash: | speaker-papa-shade-idaho |
| File name: | doc_rfq Oferta KH 09281.pdf.com |
| Download: | download sample |
| Signature | QuasarRAT |
| File size: | 3'706'880 bytes |
| First seen: | 2024-09-09 06:52:25 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 98304:JrDJO6ifOJhQGiwCa98Grb6PFMPhQCMmgu1gGHO1P:HOzfOJhBLCaHrk8rbfH6P |
| Threatray | 812 similar samples on MalwareBazaar |
| TLSH | T1980633D59B29E12AC749133E4931E1379E355E6EF006A30EC7CEFCD7398B2563A58848 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer) |
| Reporter | Anonymous |
| Tags: | exe QuasarRAT |
Intelligence
File Origin
# of uploads :
1
# of downloads :
387
Origin country :
USVendor Threat Intelligence
Malware family:
asyncrat
ID:
1
File name:
doc_rfq Oferta KH 09281.pdf.com
Verdict:
Malicious activity
Analysis date:
2024-09-09 06:55:25 UTC
Tags:
rat asyncrat remote quasar evasion
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Execution Generic Infostealer Network Stealth Trojan Msil
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Creating a file in the %AppData% subdirectories
Launching a process
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
masquerade packed
Verdict:
Malicious
Labled as:
Malware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
Quasar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected Quasar RAT
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2024-09-09 06:31:42 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
16 of 24 (66.67%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 802 additional samples on MalwareBazaar
Result
Malware family:
quasar
Score:
10/10
Tags:
family:quasar botnet:long leg discovery spyware trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Executes dropped EXE
Quasar RAT
Quasar payload
Malware Config
C2 Extraction:
twart.myfirewall.org:9792
Verdict:
Unknown
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
c5cb97fbe4243df1a99a9c82f44ad555f283fad9f4b15b791faebe5048c8fc99
MD5 hash:
3e8b57c2be9df63483a368b71ccb938b
SHA1 hash:
deb26a1b7f616c8d392ae55dd279140b034a4060
Detections:
QuasarRAT
malware_windows_xrat_quasarrat
win_quasarrat_j2
cn_utf8_windows_terminal
MAL_QuasarRAT_May19_1
Parent samples :
5a3a32262eb6d6ca3126a6055e32cd1c0a680637b3f238d0fbb0e36bc9b8081d
3255bba29d1d4de38cb9d72636251ed19516ee5c090512f4332f38b837cf13f0
d80b06effbd34b981b32276034abe3c118ac51a53ace4a253bb52c90cb18f13d
a388e34ff2cb46b718c443618a4597468bfc2236195c06bccbfa71dbf5d47479
c40f2fe5758bf18b22131930c426b2551b191d4ec50ea072a232895d006eace1
c5cb97fbe4243df1a99a9c82f44ad555f283fad9f4b15b791faebe5048c8fc99
6230049aca6cf64db37be7c35946481041629c4f40311f5a39ba45303bd992e7
f9fe40ca4d842619322a11c4013a2210132d4c7afa0c4ae88be17f13ee6d1b16
fd3b039df3e9a565b6964276f98c61d4555f3f3dabf1a9d76604f9ff4d4b3fb7
b4a61a178dfda52928802e1189f3bf1bef1c03aecf6b6fc99d2a3713f3d5e202
3255bba29d1d4de38cb9d72636251ed19516ee5c090512f4332f38b837cf13f0
d80b06effbd34b981b32276034abe3c118ac51a53ace4a253bb52c90cb18f13d
a388e34ff2cb46b718c443618a4597468bfc2236195c06bccbfa71dbf5d47479
c40f2fe5758bf18b22131930c426b2551b191d4ec50ea072a232895d006eace1
c5cb97fbe4243df1a99a9c82f44ad555f283fad9f4b15b791faebe5048c8fc99
6230049aca6cf64db37be7c35946481041629c4f40311f5a39ba45303bd992e7
f9fe40ca4d842619322a11c4013a2210132d4c7afa0c4ae88be17f13ee6d1b16
fd3b039df3e9a565b6964276f98c61d4555f3f3dabf1a9d76604f9ff4d4b3fb7
b4a61a178dfda52928802e1189f3bf1bef1c03aecf6b6fc99d2a3713f3d5e202
SH256 hash:
555189c55efac73ebcb50011ceac66285afc256eae4c1afeef73f8ef8a208409
MD5 hash:
cf2d97c8c6b7949847507da6caf7f968
SHA1 hash:
0170e169e9103b59481d465e4628524cade90600
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
c59a72e874640d2d2c5669edc14fdeb82a72cbacde61679907d2926b8ed79d08
MD5 hash:
b37fc99b846edbde0d0f36bee1760849
SHA1 hash:
0016396b048dcbda5b87742c32678f706db6362c
SH256 hash:
6230049aca6cf64db37be7c35946481041629c4f40311f5a39ba45303bd992e7
MD5 hash:
0994bce735fc8bb848d1431edf6338da
SHA1 hash:
6862b41edee8d724004e9ada90d21289c3d45bef
Malware family:
QuasarRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Quasar
Score:
0.90
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.