MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a77fed3715f635883d0e54c30ab4d3ccad5afe0f845d27e5bff0f9410df4aaee. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 12 File information Comments

SHA256 hash: a77fed3715f635883d0e54c30ab4d3ccad5afe0f845d27e5bff0f9410df4aaee
SHA3-384 hash: 929221e4168e832a3fbbffcdb8c8acf9c0b4090f1708cb6c9cb97e8e60635949f25f38c8aad5ef9e81f55f1c7d5aaa7a
SHA1 hash: 6f0410e654c8017a0f3b3f170d71f19fa1dcaa50
MD5 hash: cb8c94401e839b730b97dc5339bec791
humanhash: helium-angel-butter-florida
File name:cb8c94401e839b730b97dc5339bec791.exe
Download: download sample
Signature QuasarRAT
File size:1'972'224 bytes
First seen:2025-06-06 05:43:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'748 x AgentTesla, 19'652 x Formbook, 12'246 x SnakeKeylogger)
ssdeep 24576:gDA8DvSWeWBRYRR1qJvHIPbcNE0KKSb7yviUSQaBaOwIRxl2S62/9HEoV0brR7X5:6Z7YReEwKKSb7L3wip6AEK
Threatray 38 similar samples on MalwareBazaar
TLSH T11D95BF2439EA801AF1B7AF75DBD074CA9B7EF223771A964E145103460E63B41EDC723A
TrID 58.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
13.2% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
8.4% (.EXE) Win64 Executable (generic) (10522/11/4)
5.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
Reporter abuse_ch
Tags:exe QuasarRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
435
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
cb8c94401e839b730b97dc5339bec791.exe
Verdict:
Malicious activity
Analysis date:
2025-06-06 05:58:37 UTC
Tags:
uac pastebin crypto-regex

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
emotet virus msil remo
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Connection attempt to an infection source
Sending a TCP request to an infection source
Query of malicious DNS domain
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
.NET source code contains potential unpacker
Connects to a pastebin service (likely for C&C)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Yara detected Quasar RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Backdoor.FormBook
Status:
Malicious
First seen:
2025-06-02 05:29:18 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
30 of 36 (83.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Legitimate hosting services abused for malware hosting/C2
Verdict:
Malicious
Tags:
Win.Malware.Generic-9883083-0
YARA:
n/a
Unpacked files
SH256 hash:
a77fed3715f635883d0e54c30ab4d3ccad5afe0f845d27e5bff0f9410df4aaee
MD5 hash:
cb8c94401e839b730b97dc5339bec791
SHA1 hash:
6f0410e654c8017a0f3b3f170d71f19fa1dcaa50
SH256 hash:
a0af255ea4b09a8cdb995b8c6fd1075e46f098e23c2351c974e6ded9b8b620cf
MD5 hash:
c52a44933d17d576d4c97b4cb0545841
SHA1 hash:
092696fdcc034910aa02c94a5c93f4e1e86e0c50
Detections:
SUSP_NET_Large_Static_Array_In_Small_File_Jan24
SH256 hash:
4c9615496970ea84320e2a6e99f8fb828e3c7790384df5585d93fc368885d94e
MD5 hash:
50e6524b7ee9c2c93f5210b63cb1ca54
SHA1 hash:
3e296ec3bb24750833ea80515e6fb4c73874c91a
SH256 hash:
e94ccf1aef8652612dedf3c0a5c1b40a4197eecadc12c0a60767ace2748fd587
MD5 hash:
9b2b974de7ca2375c12a3e8de556e456
SHA1 hash:
4304c42ffdf310bbf52cd5961e71b70facddab23
SH256 hash:
a5de012f7e0782e7c7efb2570ab9d832eb0dbf6dcb9ea047853c1eb7caf37ef7
MD5 hash:
929a8cfeea12fdeac5dbfb89c7287387
SHA1 hash:
85a28762584d4b946375b38c88a27ef742617d4d
SH256 hash:
bc0243134c93c55ea105d0e9c2a43b6030e973290d0a061cf3a61986a2268a88
MD5 hash:
d2edde626c241549eab636aa87fb5d38
SHA1 hash:
8d836febd477b3ec44cc37f4f0aecdaa1d7db788
SH256 hash:
e5ac7c0e3829dc381f8cded631fa19f8d18540d1d8917da0e66519c474139148
MD5 hash:
82d9f971c1881dd6573d31322dffe29e
SHA1 hash:
ef92594a50126f4d6968bd13e2fcd8fee4110558
Detections:
SUSP_NET_Large_Static_Array_In_Small_File_Jan24 HKTL_NET_GUID_Quasar
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Costura_Protobuf
Author:@bartblaze
Description:Identifies Costura and Protobuf in .NET assemblies, respectively for storing resources and (de)serialization. Seen together might indicate a suspect binary.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:INDICATOR_EXE_Packed_Fody
Author:ditekSHen
Description:Detects executables manipulated with Fody
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments