MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 93df359df8737052e68d069b9c425d797c0de4b63672ede2839b907385528c40. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 24 File information Comments

SHA256 hash: 93df359df8737052e68d069b9c425d797c0de4b63672ede2839b907385528c40
SHA3-384 hash: cad19ddf1a949f482ac9ce211f391b3e1c4e3267f896bc1aaf9d7b535ab1ee933e58ab4b61d00eb8679f7369aba2c30d
SHA1 hash: 1234d9db0f328d527d260d4b47027b3caa619675
MD5 hash: 168d91213cc31c6591e9616cd10cab22
humanhash: fourteen-aspen-item-timing
File name:Client.exe
Download: download sample
Signature QuasarRAT
File size:1'666'048 bytes
First seen:2025-11-23 00:02:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'662 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 24576:ugpsloS2eWBRwRR16zhHIPbcNK0KKm77yviUSQaZaOwI55l2S62r92bY9GkQm:ugCli7wR2EgKKm77LrwCB6/CG
TLSH T1D975F010B7F6811AE1BF5BB8F4B715580B33B952DA3AC78E098C509E1EE3341AD517A3
TrID 58.8% (.RLL) Microsoft Resource Library (x86) (177572/6/26)
24.2% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
5.4% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.4% (.EXE) Win64 Executable (generic) (10522/11/4)
2.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
Magika pebin
Reporter Hexastrike
Tags:exe QuasarRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
25
Origin country :
IE IE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Client.exe
Verdict:
Malicious activity
Analysis date:
2025-11-23 05:55:05 UTC
Tags:
crypto-regex pulsar rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect quasar emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Connection attempt
DNS request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm anti-vm base64 hacktool keylogger lolbin obfuscated packed privilege quasarrat reconnaissance runonce
Verdict:
Malicious
Labled as:
VirTool_MSIL_Aikaantivm_GG_MTB
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-11-07T12:44:00Z UTC
Last seen:
2025-11-08T12:08:00Z UTC
Hits:
~10
Verdict:
QuasarRat
YARA:
15 match(es)
Tags:
.Net Executable Fody/Costura Packer Html Malicious Managed .NET PDB Path PE (Portable Executable) PE File Layout QuasarRat RAT SOS: 0.16 SOS: 0.19 SOS: 0.20 SOS: 0.22 SOS: 0.23 SOS: 0.25 SOS: 0.26 SOS: 0.27 SOS: 0.29 SOS: 0.32 SOS: 0.34 SOS: 0.35 SOS: 0.63 Win 32 Exe x86
Threat name:
Win32.Hacktool.Aikaantivm
Status:
Malicious
First seen:
2025-11-07 18:09:11 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
21 of 24 (87.50%)
Threat level:
  1/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar botnet:office04 spyware trojan
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Quasar RAT
Quasar family
Quasar payload
Malware Config
C2 Extraction:
127.0.0.1:2709
Verdict:
Malicious
Tags:
red_team_tool rat quasar_rat backdoor backnet Win.Malware.Generic-9883083-0
YARA:
HKTL_EXE_AlKhaser_Jul_01 MAL_QuasarRAT_May19_1 malware_windows_quasarrat MAL_BackNet_Nov18_1
Unpacked files
SH256 hash:
a0af255ea4b09a8cdb995b8c6fd1075e46f098e23c2351c974e6ded9b8b620cf
MD5 hash:
c52a44933d17d576d4c97b4cb0545841
SHA1 hash:
092696fdcc034910aa02c94a5c93f4e1e86e0c50
Detections:
SUSP_NET_Large_Static_Array_In_Small_File_Jan24
SH256 hash:
4c9615496970ea84320e2a6e99f8fb828e3c7790384df5585d93fc368885d94e
MD5 hash:
50e6524b7ee9c2c93f5210b63cb1ca54
SHA1 hash:
3e296ec3bb24750833ea80515e6fb4c73874c91a
SH256 hash:
43f818efbd0653d2f5c0043daad7edbccd7512b4f9a98cd24b50caa33fe081d5
MD5 hash:
6913c0c0aad15d8b5a813f0fc01eeeed
SHA1 hash:
4fe57eec4a33286625b5ba47eb2c87625f5052fe
Detections:
SUSP_NET_Large_Static_Array_In_Small_File_Jan24
SH256 hash:
1d37d62e909e3c37263d0f4d9469ca46e05dcae86021935ffe755ce67fa834ad
MD5 hash:
c8aeb20825968a894e0b603c2e6644ec
SHA1 hash:
717e6e61bcdf2acf0a6aa2b3cf971b58d99ad477
Detections:
SUSP_NET_Large_Static_Array_In_Small_File_Jan24 HKTL_NET_GUID_Quasar
SH256 hash:
56f525e33494f4cd2a560a71cdf237303a3fb54a8fa44e1693eba35c9245c60a
MD5 hash:
07137e5cc4d5ecc95ca267c9dce042d4
SHA1 hash:
d82f5e3d718bc9172fcfe0e8c50cb20251762058
SH256 hash:
08c4bd73c0c8191922216e50011cf79a4eb3f48157f3121f5c67cd789afc689c
MD5 hash:
9e2c85737cdfc6b8da7c89bb22007ab6
SHA1 hash:
dadaa3784e2d80c635641f9d2b64cf55ed39426c
SH256 hash:
93df359df8737052e68d069b9c425d797c0de4b63672ede2839b907385528c40
MD5 hash:
168d91213cc31c6591e9616cd10cab22
SHA1 hash:
1234d9db0f328d527d260d4b47027b3caa619675
Detections:
QuasarRAT
Malware family:
QuasarRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_Dlls
Rule name:Costura_Protobuf
Author:@bartblaze
Description:Identifies Costura and Protobuf in .NET assemblies, respectively for storing resources and (de)serialization. Seen together might indicate a suspect binary.
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:INDICATOR_EXE_Packed_Fody
Author:ditekSHen
Description:Detects executables manipulated with Fody
Rule name:Indicator_MiniDumpWriteDump
Author:Obscurity Labs LLC
Description:Detects PE files and PowerShell scripts that use MiniDumpWriteDump either through direct imports or string references
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL
Author:ditekSHen
Description:Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
Rule name:MAL_BackNet_Nov18_1
Author:Florian Roth (Nextron Systems)
Description:Detects BackNet samples
Reference:https://github.com/valsov/BackNet
Rule name:MAL_BackNet_Nov18_1_RID2D6D
Author:Florian Roth
Description:Detects BackNet samples
Reference:https://github.com/valsov/BackNet
Rule name:MAL_QuasarRAT_May19_1
Author:Florian Roth (Nextron Systems)
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:MAL_QuasarRAT_May19_1
Description:Detects QuasarRAT malware
Rule name:MAL_QuasarRAT_May19_1_RID2E1E
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments