MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 890640a258f6876bf27452acbb0e0eaf4a3286f1bca30bc02822d30052a0eeaa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 9


Intelligence 9 IOCs YARA 16 File information Comments

SHA256 hash: 890640a258f6876bf27452acbb0e0eaf4a3286f1bca30bc02822d30052a0eeaa
SHA3-384 hash: aa720b2dc745d53ad3225fa6b020a0a73d7bbb788bd2fd7ade91e1786b5cd45862ed681318780f0104264cd293368702
SHA1 hash: a8c4deecbf963a1bdf96dc51c9316dc89eb32965
MD5 hash: ee06abc2a32c9b67bd61db1b4088a47d
humanhash: dakota-juliet-tennessee-kansas
File name:Client1.exe
Download: download sample
Signature QuasarRAT
File size:1'203'200 bytes
First seen:2021-01-02 17:14:32 UTC
Last seen:2021-01-02 19:04:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6f25fb96b6fd81b4bb5d3c9f918e98b8 (1 x NanoCore, 1 x QuasarRAT, 1 x Arechclient2)
ssdeep 24576:UvZKkI29WXJHIW5alDKMAEjiI1kfhVvvh5F97Y6gsAnjWsTT1:YvdEVIIoDD1SfLv5VgsAjW
Threatray 186 similar samples on MalwareBazaar
TLSH 9C452325CDC808BFF5F62B7508F910AF233539FA9DBD4B96611622F61FAA8B04470719
Reporter o2genum
Tags:QuasarRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
319
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
t-rex-0.19.5-win.exe
Verdict:
Malicious activity
Analysis date:
2021-01-02 16:57:29 UTC
Tags:
miner autoit evasion trojan rat quasar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a window
Launching cmd.exe command interpreter
DNS request
Creating a process from a recently created file
Creating a file in the %AppData% subdirectories
Deleting a recently created file
Sending a UDP request
Enabling autorun by creating a file
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Contains functionality to disable the Task Manager (.Net Source)
Deletes shadow drive data (may be related to ransomware)
Drops PE files with a suspicious file extension
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Obfuscated command line found
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: Drops script at startup location
Sigma detected: Suspicious Certutil Command
Submitted sample is a known malware sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected AntiVM_3
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 335543 Sample: Client1.exe Startdate: 02/01/2021 Architecture: WINDOWS Score: 100 68 Malicious sample detected (through community Yara rule) 2->68 70 Multi AV Scanner detection for submitted file 2->70 72 Yara detected AntiVM_3 2->72 74 12 other signatures 2->74 10 Client1.exe 1 6 2->10         started        12 wscript.exe 2->12         started        14 rundll32.exe 2->14         started        process3 process4 16 cmd.exe 1 10->16         started        18 cmd.exe 1 10->18         started        signatures5 21 cmd.exe 2 16->21         started        24 conhost.exe 16->24         started        26 certutil.exe 2 16->26         started        76 Submitted sample is a known malware sample 18->76 28 conhost.exe 18->28         started        process6 signatures7 78 Obfuscated command line found 21->78 80 Uses ping.exe to sleep 21->80 30 fontdrvhost.com 21->30         started        33 PING.EXE 1 21->33         started        36 findstr.exe 1 21->36         started        39 2 other processes 21->39 process8 dnsIp9 86 Drops PE files with a suspicious file extension 30->86 41 fontdrvhost.com 7 30->41         started        58 127.0.0.1 unknown unknown 33->58 50 C:\Users\user\AppData\...\fontdrvhost.com, Targa 36->50 dropped 60 MrJnKP.MrJnKP 39->60 file10 signatures11 process12 dnsIp13 62 iBpxsvNvooCSptfPJltFoi.iBpxsvNvooCSptfPJltFoi 41->62 52 C:\Users\user\AppData\...\FiyuUHJRzX.com, PE32 41->52 dropped 54 C:\Users\user\AppData\Local\...\RegAsm.exe, PE32 41->54 dropped 56 C:\Users\user\AppData\...\FiyuUHJRzX.url, MS 41->56 dropped 82 Writes to foreign memory regions 41->82 84 Injects a PE file into a foreign processes 41->84 46 RegAsm.exe 15 4 41->46         started        file14 signatures15 process16 dnsIp17 64 ip-api.com 208.95.112.1, 49725, 80 TUT-ASUS United States 46->64 66 94.242.224.249, 222, 49728 ROOTLU Luxembourg 46->66 88 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 46->88 90 Hides that the sample has been downloaded from the Internet (zone.identifier) 46->90 92 Installs a global keyboard hook 46->92 signatures18
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-01-02 17:15:05 UTC
AV detection:
7 of 28 (25.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Runs ping.exe
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Drops startup file
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
890640a258f6876bf27452acbb0e0eaf4a3286f1bca30bc02822d30052a0eeaa
MD5 hash:
ee06abc2a32c9b67bd61db1b4088a47d
SHA1 hash:
a8c4deecbf963a1bdf96dc51c9316dc89eb32965
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CAP_HookExKeylogger
Author:Brian C. Bell -- @biebsmalwareguy
Reference:https://github.com/DFIRnotes/rules/blob/master/CAP_HookExKeylogger.yar
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:CN_disclosed_20180208_KeyLogger_1
Author:Florian Roth
Description:Detects malware from disclosed CN malware set
Reference:https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details
Rule name:INDICATOR_SUSPICIOUS_GENInfoStealer
Author:ditekSHen
Description:Detects executables containing common artifcats observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_GENRansomware
Author:ditekSHen
Description:detects command variations typically used by ransomware
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MALWARE_Win_QuasarRAT
Author:ditekSHen
Description:QuasarRAT payload
Rule name:MAL_QuasarRAT_May19_1
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:MSILStealer
Author:https://github.com/hwvs
Description:Detects strings from C#/VB Stealers and QuasarRat
Reference:https://github.com/quasar/QuasarRAT
Rule name:Quasar
Author:JPCERT/CC Incident Response Group
Description:detect QuasarRAT in memory
Rule name:Quasar_RAT_1
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:Quasar_RAT_2
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Vermin_Keylogger_Jan18_1
Author:Florian Roth
Description:Detects Vermin Keylogger
Reference:https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/
Rule name:win_blackshades_w0
Author:Jean-Philippe Teissier / @Jipe_
Rule name:xRAT_1
Author:Florian Roth
Description:Detects Patchwork malware
Reference:https://goo.gl/Pg3P4W

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

QuasarRAT

Executable exe 890640a258f6876bf27452acbb0e0eaf4a3286f1bca30bc02822d30052a0eeaa

(this sample)

Comments