MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 888497ac8f3cb030dc34d198ef8e307fab6b129f31f4fc9c41ea78f94d831529. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
QuasarRAT
Vendor detections: 5
| SHA256 hash: | 888497ac8f3cb030dc34d198ef8e307fab6b129f31f4fc9c41ea78f94d831529 |
|---|---|
| SHA3-384 hash: | dd910c218fb782fd9a2299b84cbffcfe87236f25882ae32c103b36217a8df2ebc4312f4226352c45a20b1f8d293605b3 |
| SHA1 hash: | a69b71a21705aed2fdea04945fc44890c08e22b4 |
| MD5 hash: | 8e22d4d13e86da51677f67ae09a0aec0 |
| humanhash: | alpha-mobile-uranus-table |
| File name: | 888497ac8f3cb030dc34d198ef8e307fab6b129f31f4fc9c41ea78f94d831529 |
| Download: | download sample |
| Signature | QuasarRAT |
| File size: | 5'738'496 bytes |
| First seen: | 2021-09-21 08:25:27 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | be63889866f6bba2109402ee273e5652 (3 x RemcosRAT, 2 x RedLineStealer, 1 x QuasarRAT) |
| ssdeep | 98304:yDoMg6ltF0fzbiYy3YBKwQFmmtNUZaB+09H6I9FawsPqSheEXW9W:ysM9ltiXiYQdFlULWa60/QEXW9W |
| Threatray | 7'650 similar samples on MalwareBazaar |
| TLSH | T11246331533E185BFE8D32D725BFC17F691BE81085F2108C727CD679E1A38A82A13965E |
| dhash icon | 48a4e07098482c04 (1 x QuasarRAT) |
| Reporter | |
| Tags: | exe QuasarRAT RAT |
Intelligence
File Origin
# of uploads :
1
# of downloads :
104
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
888497ac8f3cb030dc34d198ef8e307fab6b129f31f4fc9c41ea78f94d831529
Verdict:
No threats detected
Analysis date:
2021-09-21 08:26:07 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Detection(s):
Verdict:
Malicious
Result
Threat name:
Quasar
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious names
Creates files in alternative data streams (ADS)
Creates files in the system32 config directory
Deletes shadow drive data (may be related to ransomware)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender notifications (registry)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sample uses process hollowing technique
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Svchost Process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses cmd line tools excessively to alter registry or file data
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Very long command line found
Writes to foreign memory regions
Yara detected Quasar RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Dropper.FrauDrop
Status:
Malicious
First seen:
2021-09-19 02:40:33 UTC
AV detection:
33 of 45 (73.33%)
Threat level:
3/5
Verdict:
malicious
Similar samples:
+ 7'640 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
10/10
Tags:
discovery evasion exploit persistence trojan upx
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Loads dropped DLL
Modifies file permissions
Blocks application from running via registry modification
Executes dropped EXE
Modifies Windows Firewall
Possible privilege escalation attempt
Registers new Print Monitor
UPX packed file
Modifies Windows Defender notification settings
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
f006a5ad7b17adf5d9e41df49a6e9b867a86ad7215071af44515f90f75a7a420
MD5 hash:
1df4469fa0a5ecaf52e6691fe7280c0c
SHA1 hash:
5572514b3d9836d6727f8811ac72c049e7d51cf3
SH256 hash:
2127872bf69c1f791b429f681fc1775b8ca0aaaeb62d2ee969b55de9e66f3f58
MD5 hash:
b5c403eecd801600383a91bdb6224798
SHA1 hash:
d291958d730211cfe777485ceb56d55aec679289
SH256 hash:
d7a2e665b7dfc4e4321dc454039070214e659eee1149185d4a91be7d2ad9756e
MD5 hash:
8d9a71c667073eada93d6a1e7f3bb87f
SHA1 hash:
a6c8fdf29d48c3aaece0f94df4b78f5e3e2ba0ed
SH256 hash:
757c68bf39d019e4582f5eaa18dbefb5465de2a4819b82c6b59ffc778fe09ff0
MD5 hash:
d8ea1b723b850519ff71d5a7226a8730
SHA1 hash:
277e24c3f016400e623f8a787720517996dcd76f
SH256 hash:
3d6c81ee274a23bfac0eb41f77c2c2c6167198eae37a6aa80db77536bd72c6ab
MD5 hash:
fa848070553ca81d5f6abfd811728a95
SHA1 hash:
de3c060f931ddf8463a65b483f2432876f84ebc7
SH256 hash:
8a9b8a19869256c089e94855439c40c0b1e49995a8d36e5862583891023c47c5
MD5 hash:
578174415c78721dc0a4c388c1fbc235
SHA1 hash:
5e2f0eeebb8574fd4985a0c0335300325b39c3a2
SH256 hash:
6bc8e296f6935f5688234c3810f0326faebd898688688dfe3d5475e19cc5a83a
MD5 hash:
ecfb232ae47a07667a5850104ebebe26
SHA1 hash:
53db1507d46209797cad3d4029964cdfea708d8e
SH256 hash:
ff7d01279d04b59a6520a91a1a5ad9564150117c6825ecc7c3b8e158732ffc9a
MD5 hash:
b107579893bd84be35019313b8f80e02
SHA1 hash:
bf39ea7e4cd4281e1b6cdb6817a90c80c3d6ac09
SH256 hash:
888497ac8f3cb030dc34d198ef8e307fab6b129f31f4fc9c41ea78f94d831529
MD5 hash:
8e22d4d13e86da51677f67ae09a0aec0
SHA1 hash:
a69b71a21705aed2fdea04945fc44890c08e22b4
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
iSpy Keylogger
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.