MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 62e2c7d860a0e3e0975c5b9da5193f9ab3ca6c56ef4eea46d17cc87ac4598b90. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
QuasarRAT
Vendor detections: 13
| SHA256 hash: | 62e2c7d860a0e3e0975c5b9da5193f9ab3ca6c56ef4eea46d17cc87ac4598b90 |
|---|---|
| SHA3-384 hash: | 1221854e39fa9ebcc0d8920470b3b3bc5f4b4639df377b4dc42f555c61fc30d1e3c48c8e94884386e4a45b26efb95c9d |
| SHA1 hash: | 900cef8e0691db4218c022de3a3922c8da9632ea |
| MD5 hash: | 0160184760d162a2719f957c64cbdf28 |
| humanhash: | helium-berlin-foxtrot-network |
| File name: | 0160184760d162a2719f957c64cbdf28.exe |
| Download: | download sample |
| Signature | QuasarRAT |
| File size: | 2'070'016 bytes |
| First seen: | 2025-06-13 06:11:19 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 24576:AEJSWeWBRYRR1qJvHIPbcNE0KKSb7yviUSQaBaOwIRxl2S62/9RwgSE74c96bUe:J7YReEwKKSb7L3wip6mw5g6 |
| Threatray | 26 similar samples on MalwareBazaar |
| TLSH | T1DAA5AF303BFA4019F1B7AE75D7D0B6994AEEB1223606967924411B460E23743FDE723B |
| TrID | 58.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 13.2% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 8.4% (.EXE) Win64 Executable (generic) (10522/11/4) 5.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.0% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| Magika | pebin |
| dhash icon | 30306870dcc8ae8c (1 x QuasarRAT) |
| Reporter | |
| Tags: | exe QuasarRAT |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
62e2c7d860a0e3e0975c5b9da5193f9ab3ca6c56ef4eea46d17cc87ac4598b90
eb72d6dd2158ce9ad453f8ecfd5d6900cce588c196ae5806268cbaf3475848da
6e6e691a7f98fc4086f2bec28b34b2474ab783e9408c611e789a00107a24c227
7e4fe2503e3dd2028c230f5e0413423f1dbbcbda01a252d22c8ece243979e927
4f831bfdd5b3ab7f4194b6fd391cac71b70ba7ced3489eb2bdf78170eb1214e9
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_beacon_detected |
|---|---|
| Author: | 0x0d4y |
| Description: | This rule detects cobalt strike beacons. |
| Rule name: | Costura_Protobuf |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies Costura and Protobuf in .NET assemblies, respectively for storing resources and (de)serialization. Seen together might indicate a suspect binary. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Thread |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | Detect_PowerShell_Obfuscation |
|---|---|
| Author: | daniyyell |
| Description: | Detects obfuscated PowerShell commands commonly used in malicious scripts. |
| Rule name: | growtopia |
|---|---|
| Author: | Michelle Khalil |
| Description: | This rule detects unpacked growtopia stealer malware samples. |
| Rule name: | INDICATOR_EXE_Packed_Fody |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables manipulated with Fody |
| Rule name: | Indicator_MiniDumpWriteDump |
|---|---|
| Author: | Obscurity Labs LLC |
| Description: | Detects PE files and PowerShell scripts that use MiniDumpWriteDump either through direct imports or string references |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.