MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7e7076c3ea0c14873923567195208738da17678b03c1bbc5d10a80c3570b26b3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
QuasarRAT
Vendor detections: 9
| SHA256 hash: | 7e7076c3ea0c14873923567195208738da17678b03c1bbc5d10a80c3570b26b3 |
|---|---|
| SHA3-384 hash: | c796b081c6c7f00ad755f7b4d9003b315067665e42da3ca30e234b41303fb7659fe215ce734ef0c7e30f65ed36deb91e |
| SHA1 hash: | afd744fe8052a7c159dd945f404afc3dc8312376 |
| MD5 hash: | 414c39c1a4d1628764f85eb505a491fe |
| humanhash: | solar-earth-nitrogen-fruit |
| File name: | TOP URGENT RFQ 2021 Anson Yang.exe |
| Download: | download sample |
| Signature | QuasarRAT |
| File size: | 7'996'928 bytes |
| First seen: | 2021-01-04 07:37:24 UTC |
| Last seen: | 2021-01-04 09:30:36 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger) |
| ssdeep | 1536:OhD8sMwd7X3aXDKeDT6AotGZ0mpelE8ovUmePe5JxgUOUXQUncY0KENFGQmDJQnv:Oh4f0nkKeKAotGZ1vvUize+skCEzS |
| Threatray | 160 similar samples on MalwareBazaar |
| TLSH | 92860D116FE3254EF2F3E07612B19AD6AF38FA7A72445A0D825D2B550C13F862F83D16 |
| Reporter | |
| Tags: | exe QuasarRAT |
abuse_ch
Malspam distributing unidentified malware:HELO: cbdjo.cam
Sending IP: 111.90.159.32
From: Anson Yang <weldman.huang@msa.hinet.net>
Reply-To: weldman.huang@msa.hinet.net
Subject: Re::TOP URGENT RFQ 2021
Attachment: TOP URGENT RFQ 2021 Anson Yang.rar (contains "TOP URGENT RFQ 2021 Anson Yang.exe")
Intelligence
File Origin
# of uploads :
2
# of downloads :
267
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
TOP URGENT RFQ 2021 Anson Yang.exe
Verdict:
Malicious activity
Analysis date:
2021-01-04 07:47:06 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
QuasarRAT
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a UDP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Enabling autorun
Result
Threat name:
Quasar
Detection:
malicious
Classification:
troj.adwa.evad
Score:
100 / 100
Signature
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to hide user accounts
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Drops PE files to the startup folder
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses netsh to modify the Windows network and firewall settings
Yara detected Quasar RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2021-01-04 00:53:59 UTC
AV detection:
9 of 47 (19.15%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 150 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
10/10
Tags:
evasion persistence
Behaviour
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Drops startup file
Loads dropped DLL
Executes dropped EXE
Modifies Windows Firewall
Modifies WinLogon for persistence
Unpacked files
SH256 hash:
31277ec364d2a59720ca5bfbbc28f3d5736f00e6eeb8bfd6a68b2878e7d651a2
MD5 hash:
3e056f97f5ac6a32c31f21f4bc0a40d0
SHA1 hash:
bd941d3d7b3485effdc9fee664c60c949bbfb59d
SH256 hash:
3a96d9a797a3b6b3ea0d8264ed1078508df9557e2f453217d52a75907f9b9465
MD5 hash:
547ebc92cac936d8c3459d2765948f4a
SHA1 hash:
09c143d609b65b19a97289ca7645df2a0bc39c83
SH256 hash:
c1428ec7129ad3e36dad35d8992602cefcd6a593952834897424314fe029dd4b
MD5 hash:
67ca4c5eed9cab4b08064d4314dc0a86
SHA1 hash:
61dfa1d80d9e6b506d29e3897dd3ca08ade30988
Parent samples :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 hash:
3db2b0c012e3e770548b36eb84ea2278f34dfda82a269fc30f38e743b33855e3
MD5 hash:
ef33c4c8efc8c1b355ad64e12b010070
SHA1 hash:
ac30158d8bd81ec0b728a299c9e72789b4f33f31
SH256 hash:
542be6a092437c47aec4c046bf4636f9a3153954b0384141b8cc2922d68a38b5
MD5 hash:
bfb7da75069724d5ec80b44bc2e46d9f
SHA1 hash:
fe757e6a079f7be6efa5d15df7260792560f6576
SH256 hash:
136ba3ce9ed44d1e2ab67e1f08aac6c19ee817b967a3069ac1c4452b455aceb1
MD5 hash:
176d78db1e2b8426b2afa487b60dacee
SHA1 hash:
f68d2dc51a5e116d8bc44585df2334967fcaab58
SH256 hash:
0d30c230cbbeb3a5b47fe3266095300da90a81f120fb4b39b7ce6574967ecdc7
MD5 hash:
76fc5ae74b797393465cc6ea1bf39df4
SHA1 hash:
dcedeb08d0733be3a607b500c0c33866879f0544
SH256 hash:
7e7076c3ea0c14873923567195208738da17678b03c1bbc5d10a80c3570b26b3
MD5 hash:
414c39c1a4d1628764f85eb505a491fe
SHA1 hash:
afd744fe8052a7c159dd945f404afc3dc8312376
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.