MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 636f2b1624573965b7fc093117d8927ebffdbc0d852c241aede59fe81fece84f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 15


Intelligence 15 IOCs YARA 7 File information Comments 1

SHA256 hash: 636f2b1624573965b7fc093117d8927ebffdbc0d852c241aede59fe81fece84f
SHA3-384 hash: 1a527fbdb9085e11d0c2add477875326426cda66c5913931ede9880abc976461525ae66506265f64677d3902f41863ab
SHA1 hash: c8f1fc586c61c93b9cb2d9ab3401ac548e3d10e7
MD5 hash: 41b5953e5d8016a817f4f793f7eb708c
humanhash: california-friend-indigo-comet
File name:41b5953e5d8016a817f4f793f7eb708c
Download: download sample
Signature QuasarRAT
File size:549'888 bytes
First seen:2024-03-26 17:21:13 UTC
Last seen:2024-03-26 17:47:40 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash faf16be05abc0234db15c73412fc4a90 (1 x QuasarRAT)
ssdeep 6144:ScBUcxlczk0VXhumbeBJ1UW04tWu1lTWVwzYGK8zm4vK3JQErTw6f:xxlMVXhFbsVEujTWG8GTzqrTw6f
Threatray 21 similar samples on MalwareBazaar
TLSH T1AEC4AE11B3D40C72E9AB467885A35B06E7FABC121674DB4F53909E9A1F33342BB29353
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Reporter zbetcheckin
Tags:32 exe QuasarRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
302
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
q.7z
Verdict:
Malicious activity
Analysis date:
2024-03-26 19:43:47 UTC
Tags:
stealer bitrat evasion xworm

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Moving a file to the Program Files subdirectory
Replacing files
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm carberp control crypto darkvnc evasive eventvwr explorer fingerprint keylogger keylogger lolbin miner shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Contains VNC / remote desktop functionality (version string found)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected Ramnit VNC Module
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.ExplorerHijack
Status:
Malicious
First seen:
2024-03-11 20:19:18 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
31 of 37 (83.78%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Maps connected drives based on registry
Unpacked files
SH256 hash:
6594da78e285722e6f4c2d2889e89764eaf65ed3825ac0b12b23459e39c82eb9
MD5 hash:
d291715acc4a881f1339cb6b77de1a97
SHA1 hash:
8f7588999793b23b0960d64f3bafaed08be0f632
Detections:
HVNC HiddenVNC crime_win32_hvnc_banker_gen
SH256 hash:
73b5c8781c94014d2dfc093a4b464a797d0c6599b50e61ff70e3eced2148d21a
MD5 hash:
01d7ab5623c959b666c635f7cf083e22
SHA1 hash:
1ea0882e5a716306f3b6642e4ed24eaa0e0b7a19
Detections:
HVNC HiddenVNC crime_win32_hvnc_banker_gen
SH256 hash:
636f2b1624573965b7fc093117d8927ebffdbc0d852c241aede59fe81fece84f
MD5 hash:
41b5953e5d8016a817f4f793f7eb708c
SHA1 hash:
c8f1fc586c61c93b9cb2d9ab3401ac548e3d10e7
Detections:
HVNC HiddenVNC
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:crime_win32_hvnc_banker_gen
Author:@VK_Intel
Description:Detects malware banker hidden VNC
Reference:https://twitter.com/VK_Intel/status/1247058432223477760
Rule name:crime_win32_hvnc_zloader1_hvnc_generic
Author:@VK_Intel
Description:Detects Zloader hidden VNC
Reference:https://twitter.com/malwrhunterteam/status/1240664014121828352
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:HiddenVNC
Author:@bartblaze
Description:Identifies HiddenVNC, which can start remote sessions.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

QuasarRAT

Executable exe 636f2b1624573965b7fc093117d8927ebffdbc0d852c241aede59fe81fece84f

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
KERNEL_APIManipulates Windows Kernel & Driversntdll.dll::ZwClose
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::OpenProcess
KERNEL32.dll::VirtualAllocEx
KERNEL32.dll::WriteProcessMemory
KERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryA
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA

Comments



Avatar
zbet commented on 2024-03-26 17:21:14 UTC

url : hxxps://94.242.61.211/martinvnc.exe