MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a6353ed171fcd97d4b896440c003c303ae038bb9f76623516595ed53f704a762. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 10 File information Comments

SHA256 hash: a6353ed171fcd97d4b896440c003c303ae038bb9f76623516595ed53f704a762
SHA3-384 hash: 0f6d4056901cb0059249f57f55136cc12b6f200d2e36795d5428cbb9b2ffa82a2a5dc4c2003c82b692a2106e1b6f815a
SHA1 hash: 17d33f2f46a0257313d252dd6008b318d9953eb2
MD5 hash: 3995d5e5a6bb28c8ac903c3031f9ea8e
humanhash: golf-uncle-london-leopard
File name:Hwid Spoofe_nls.scr.vir
Download: download sample
Signature QuasarRAT
File size:3'838'976 bytes
First seen:2022-06-18 12:01:52 UTC
Last seen:2022-06-18 12:39:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'662 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 24576:MFjPvXGctxDi6H3FTUN5Mf2sg2ekFwzaZbgDJBHDDRxg2O+gbG8eUf4CvTvPZfwO:Kvlvi6XiNCfCcmPDRGlVebayXo4qbb
Threatray 4'311 similar samples on MalwareBazaar
TLSH T13706383439EA5029F173EFB99BE476EADA5FB6733B06A41D109003464723981EDC163E
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon d2de8f9c9e9ad818 (6 x AsyncRAT, 2 x QuasarRAT, 1 x OrcusRAT)
Reporter KdssSupport
Tags:exe QuasarRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
268
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
Hwid Spoofe‮nls.scr
Verdict:
Malicious activity
Analysis date:
2022-06-18 11:56:05 UTC
Tags:
quasar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file
Сreating synchronization primitives
Creating a process from a recently created file
Searching for synchronization primitives
Creating a file in the %AppData% subdirectories
Launching the default Windows debugger (dwwin.exe)
Launching a process
Creating a window
Changing a file
Sending a custom TCP request
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
packed packed stealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large strings
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Generic Downloader
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 648141 Sample: Hwid Spoofe_nls.scr.vir Startdate: 18/06/2022 Architecture: WINDOWS Score: 100 66 Multi AV Scanner detection for domain / URL 2->66 68 Malicious sample detected (through community Yara rule) 2->68 70 Antivirus detection for URL or domain 2->70 72 8 other signatures 2->72 9 Hwid Spoofe_nls.scr.exe 1 3 2->9         started        12 BaseHTTPRequestHandler.exe 3 2->12         started        15 BaseHTTPRequestHandler.exe 2 2->15         started        17 OpenWith.exe 2->17         started        process3 file4 60 C:\ProgramData\ver.exe, PE32 9->60 dropped 19 ver.exe 1 5 9->19         started        23 WerFault.exe 23 9 9->23         started        84 Antivirus detection for dropped file 12->84 86 Multi AV Scanner detection for dropped file 12->86 88 Machine Learning detection for dropped file 12->88 26 csc.exe 12->26         started        28 csc.exe 15->28         started        signatures5 process6 dnsIp7 58 C:\Users\user\...\BaseHTTPRequestHandler.exe, PE32 19->58 dropped 74 Antivirus detection for dropped file 19->74 76 Multi AV Scanner detection for dropped file 19->76 78 Machine Learning detection for dropped file 19->78 30 csc.exe 8 19->30         started        62 192.168.2.1 unknown unknown 23->62 80 Hides that the sample has been downloaded from the Internet (zone.identifier) 26->80 82 Installs a global keyboard hook 26->82 34 cmd.exe 26->34         started        36 cmd.exe 28->36         started        file8 signatures9 process10 dnsIp11 64 20.223.161.175, 4782 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 30->64 90 Hides that the sample has been downloaded from the Internet (zone.identifier) 30->90 92 Installs a global keyboard hook 30->92 94 Uses ping.exe to sleep 34->94 96 Uses ping.exe to check the status of other devices and networks 34->96 38 csc.exe 34->38         started        40 conhost.exe 34->40         started        42 chcp.com 34->42         started        44 PING.EXE 34->44         started        46 csc.exe 36->46         started        48 conhost.exe 36->48         started        50 chcp.com 36->50         started        52 PING.EXE 36->52         started        signatures12 process13 process14 54 conhost.exe 38->54         started        56 conhost.exe 46->56         started       
Threat name:
ByteCode-MSIL.Trojan.RemLoader
Status:
Malicious
First seen:
2022-05-30 01:17:20 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar botnet:office04 persistence spyware trojan
Behaviour
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Quasar Payload
Quasar RAT
Malware Config
C2 Extraction:
20.223.161.175:4782
Unpacked files
SH256 hash:
87bf8e67c2cf24197e21b187f9db7f00c1dba035948ce24277aee5f52dac7dc9
MD5 hash:
856fd3b0cf60476b78b7900299844fb0
SHA1 hash:
f793da6230ac36191765240608ab7791c06eb2b4
SH256 hash:
b2bf648dc5c52da742bd07fede90a5f9f60aab39e8c357a3cdac3955003a31b4
MD5 hash:
8dcb97803b90a4acad4b347a88fb71c7
SHA1 hash:
225796746eb3a4bca7e84c77d3c743930655ceea
SH256 hash:
79e8e0b6c7226ecbc6c3bf02486f76fc78bed83141b33f5341eeaf1ebef27b27
MD5 hash:
d9d41393702ca499c50abe13cce12e8b
SHA1 hash:
80d6907785f6562804cf1556630fc054586ce3de
SH256 hash:
a6353ed171fcd97d4b896440c003c303ae038bb9f76623516595ed53f704a762
MD5 hash:
3995d5e5a6bb28c8ac903c3031f9ea8e
SHA1 hash:
17d33f2f46a0257313d252dd6008b318d9953eb2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_GENInfoStealer
Author:ditekSHen
Description:Detects executables containing common artifcats observed in infostealers
Rule name:MALWARE_Win_QuasarStealer
Author:ditekshen
Description:Detects Quasar infostealer
Rule name:MAL_Lokibot_Stealer
Description:Detects Lokibot Stealer Variants
Rule name:MAL_QuasarRAT_May19_1
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:MAL_QuasarRAT_May19_1_RID2E1E
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Vermin_Keylogger_Jan18_1
Author:Florian Roth
Description:Detects Vermin Keylogger
Reference:https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments