MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a0dfd88d6209e14c971713ccee2c6b4dd1dfd5eae40fd894e43917c41f456103. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: a0dfd88d6209e14c971713ccee2c6b4dd1dfd5eae40fd894e43917c41f456103
SHA3-384 hash: 55988e1aad7edfecb8f18f4bdea66111f7f9a340e8402a0db718202a3bbd2c43c33d9ac460ab3d9e08affb1db2ebb72a
SHA1 hash: 4d8a9603838ab327e269a61ae6abd51b881bc76b
MD5 hash: bb9622608fd681fe6f0fc48d25dc52e6
humanhash: vermont-robin-music-early
File name:aisurubotnetsucksfr.hta
Download: download sample
Signature QuasarRAT
File size:13'416 bytes
First seen:2026-03-31 12:47:04 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 384:+vcnjKfi7tdbJGFkzW3/Dy59AzZnX0BP+8MJcfmy1knN3r0arkjiIF58U1N/eyY2:wa
TLSH T106528A2C19BDFA5993D9E213EA99F7236D461CAFD1B876172AF38C6CA0024C045DB4C7
Magika html
Reporter JAMESWT_WT
Tags:github-com--ashduasdoasdoasd hta QuasarRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
42
Origin country :
IT IT
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Score:
92.5%
Tags:
virus shell sage
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Behaviour
BlacklistAPI detected
Verdict:
Malicious
File Type:
hta
First seen:
2026-03-31T09:57:00Z UTC
Last seen:
2026-04-01T00:47:00Z UTC
Hits:
~10
Detections:
Trojan-Downloader.Win32.Bitser.sb Trojan-Downloader.JS.SLoad.sb Trojan.MSIL.Agent.sb HEUR:Trojan.Win32.Generic HEUR:Trojan.Script.Generic HEUR:Trojan.MSIL.Convagent.gen Backdoor.MSIL.PulsarRAT.sb PDM:Trojan.Win32.Generic Trojan-PSW.MSIL.Agent.sb Trojan.JS.SAgent.sb HEUR:Trojan-Banker.MSIL.ClipBanker.gen PDM:Exploit.Win32.Generic
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Html
Threat name:
Script-WScript.Packed.Electryon
Status:
Malicious
First seen:
2026-03-31 12:42:26 UTC
File Type:
Text (VBS)
AV detection:
7 of 38 (18.42%)
Threat level:
  1/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar discovery dropper execution spyware trojan
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Contacts third-party web service commonly abused for C2
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Download via BitsAdmin
Downloads MZ/PE file
Quasar RAT
Quasar family
Quasar payload
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments