MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7e7076c3ea0c14873923567195208738da17678b03c1bbc5d10a80c3570b26b3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 7e7076c3ea0c14873923567195208738da17678b03c1bbc5d10a80c3570b26b3
SHA3-384 hash: c796b081c6c7f00ad755f7b4d9003b315067665e42da3ca30e234b41303fb7659fe215ce734ef0c7e30f65ed36deb91e
SHA1 hash: afd744fe8052a7c159dd945f404afc3dc8312376
MD5 hash: 414c39c1a4d1628764f85eb505a491fe
humanhash: solar-earth-nitrogen-fruit
File name:TOP URGENT RFQ 2021 Anson Yang.exe
Download: download sample
Signature QuasarRAT
File size:7'996'928 bytes
First seen:2021-01-04 07:37:24 UTC
Last seen:2021-01-04 09:30:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger)
ssdeep 1536:OhD8sMwd7X3aXDKeDT6AotGZ0mpelE8ovUmePe5JxgUOUXQUncY0KENFGQmDJQnv:Oh4f0nkKeKAotGZ1vvUize+skCEzS
Threatray 160 similar samples on MalwareBazaar
TLSH 92860D116FE3254EF2F3E07612B19AD6AF38FA7A72445A0D825D2B550C13F862F83D16
Reporter abuse_ch
Tags:exe QuasarRAT


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: cbdjo.cam
Sending IP: 111.90.159.32
From: Anson Yang <weldman.huang@msa.hinet.net>
Reply-To: weldman.huang@msa.hinet.net
Subject: Re::TOP URGENT RFQ 2021
Attachment: TOP URGENT RFQ 2021 Anson Yang.rar (contains "TOP URGENT RFQ 2021 Anson Yang.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
267
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
TOP URGENT RFQ 2021 Anson Yang.exe
Verdict:
Malicious activity
Analysis date:
2021-01-04 07:47:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Enabling autorun
Result
Threat name:
Detection:
malicious
Classification:
troj.adwa.evad
Score:
100 / 100
Signature
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to hide user accounts
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Drops PE files to the startup folder
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses netsh to modify the Windows network and firewall settings
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 335678 Sample: TOP URGENT RFQ 2021  Anson ... Startdate: 04/01/2021 Architecture: WINDOWS Score: 100 58 pastebin.com 2->58 60 ip-api.com 2->60 68 Malicious sample detected (through community Yara rule) 2->68 70 Multi AV Scanner detection for dropped file 2->70 72 Multi AV Scanner detection for submitted file 2->72 74 12 other signatures 2->74 9 TOP URGENT RFQ 2021  Anson Yang.exe 3 5 2->9         started        13 TOP URGENT RFQ 2021  Anson Yang.exe 2 2->13         started        15 TOP URGENT RFQ 2021  Anson Yang.exe 2 2->15         started        17 3 other processes 2->17 signatures3 process4 file5 52 C:\...\TOP URGENT RFQ 2021  Anson Yang.exe, PE32 9->52 dropped 54 TOP URGENT RFQ 202...exe:Zone.Identifier, ASCII 9->54 dropped 56 TOP URGENT RFQ 2021  Anson Yang.exe.log, ASCII 9->56 dropped 78 Creates an undocumented autostart registry key 9->78 80 Creates autostart registry keys with suspicious names 9->80 82 Creates multiple autostart registry keys 9->82 19 TOP URGENT RFQ 2021  Anson Yang.exe 16 5 9->19         started        84 Injects a PE file into a foreign processes 13->84 signatures6 process7 dnsIp8 62 54.39.152.114, 21, 49727, 49728 OVHFR Canada 19->62 64 ip-api.com 208.95.112.1, 49725, 49736, 49740 TUT-ASUS United States 19->64 66 2 other IPs or domains 19->66 50 C:\Users\user\AppData\Roaming\Venom.exe, PE32 19->50 dropped 76 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->76 24 cmd.exe 19->24         started        26 cmd.exe 19->26         started        28 cmd.exe 19->28         started        30 6 other processes 19->30 file9 signatures10 process11 process12 32 conhost.exe 24->32         started        34 netsh.exe 24->34         started        36 conhost.exe 26->36         started        38 netsh.exe 26->38         started        40 conhost.exe 28->40         started        42 netsh.exe 28->42         started        44 conhost.exe 30->44         started        46 netsh.exe 30->46         started        48 8 other processes 30->48
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2021-01-04 00:53:59 UTC
AV detection:
9 of 47 (19.15%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion persistence
Behaviour
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Drops startup file
Loads dropped DLL
Executes dropped EXE
Modifies Windows Firewall
Modifies WinLogon for persistence
Unpacked files
SH256 hash:
31277ec364d2a59720ca5bfbbc28f3d5736f00e6eeb8bfd6a68b2878e7d651a2
MD5 hash:
3e056f97f5ac6a32c31f21f4bc0a40d0
SHA1 hash:
bd941d3d7b3485effdc9fee664c60c949bbfb59d
SH256 hash:
3a96d9a797a3b6b3ea0d8264ed1078508df9557e2f453217d52a75907f9b9465
MD5 hash:
547ebc92cac936d8c3459d2765948f4a
SHA1 hash:
09c143d609b65b19a97289ca7645df2a0bc39c83
SH256 hash:
3db2b0c012e3e770548b36eb84ea2278f34dfda82a269fc30f38e743b33855e3
MD5 hash:
ef33c4c8efc8c1b355ad64e12b010070
SHA1 hash:
ac30158d8bd81ec0b728a299c9e72789b4f33f31
SH256 hash:
542be6a092437c47aec4c046bf4636f9a3153954b0384141b8cc2922d68a38b5
MD5 hash:
bfb7da75069724d5ec80b44bc2e46d9f
SHA1 hash:
fe757e6a079f7be6efa5d15df7260792560f6576
SH256 hash:
136ba3ce9ed44d1e2ab67e1f08aac6c19ee817b967a3069ac1c4452b455aceb1
MD5 hash:
176d78db1e2b8426b2afa487b60dacee
SHA1 hash:
f68d2dc51a5e116d8bc44585df2334967fcaab58
SH256 hash:
0d30c230cbbeb3a5b47fe3266095300da90a81f120fb4b39b7ce6574967ecdc7
MD5 hash:
76fc5ae74b797393465cc6ea1bf39df4
SHA1 hash:
dcedeb08d0733be3a607b500c0c33866879f0544
SH256 hash:
7e7076c3ea0c14873923567195208738da17678b03c1bbc5d10a80c3570b26b3
MD5 hash:
414c39c1a4d1628764f85eb505a491fe
SHA1 hash:
afd744fe8052a7c159dd945f404afc3dc8312376
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

QuasarRAT

Executable exe 7e7076c3ea0c14873923567195208738da17678b03c1bbc5d10a80c3570b26b3

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments