MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b4401e082c3eb9275a7be41c333f1d7ee13894dff4f794dc3544f8397990e35e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
QuasarRAT
Vendor detections: 10
| SHA256 hash: | b4401e082c3eb9275a7be41c333f1d7ee13894dff4f794dc3544f8397990e35e |
|---|---|
| SHA3-384 hash: | 327e5cfd64cf04cdfa85ba372f70fd64a6cb5ddbc05a693da89d776e93d9c1d2f7ca51076f8687c01e95ffdfa54007a3 |
| SHA1 hash: | fd0f8618acbfff4ceb0743b468976879f24dec88 |
| MD5 hash: | a86d1b872c7339cc73f7a6c602b0166a |
| humanhash: | jupiter-queen-tango-two |
| File name: | a86d1b872c7339cc73f7a6c602b0166a.exe |
| Download: | download sample |
| Signature | QuasarRAT |
| File size: | 3'537'313 bytes |
| First seen: | 2021-08-01 04:15:50 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | fcf1390e9ce472c7270447fc5c61a0c1 (873 x DCRat, 118 x NanoCore, 94 x njrat) |
| ssdeep | 98304:UbRdNP1xkn59yXmCJG/P2T+xgHyB9bxipo:UrenrDCJgeOyE91wo |
| Threatray | 801 similar samples on MalwareBazaar |
| TLSH | T17DF53311FDC4A9B2D8E14D7255A49E20597FBC201F288E9F63B88A3B96302D1B771727 |
| dhash icon | 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne) |
| Reporter | |
| Tags: | exe QuasarRAT RAT |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 45.14.50.120:8808 | https://threatfox.abuse.ch/ioc/165299/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
1'598
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Blizzard.zip
Verdict:
Malicious activity
Analysis date:
2021-07-30 16:43:08 UTC
Tags:
trojan rat quasar
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Quasar RAT
Verdict:
Malicious
Result
Threat name:
Quasar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Beds Obfuscator
Yara detected BrowsingHistoryView browser history reader tool
Yara detected Costura Assembly Loader
Yara detected MultiObfuscated
Yara detected Quasar RAT
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Quasar
Status:
Malicious
First seen:
2021-07-28 18:34:53 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 791 additional samples on MalwareBazaar
Result
Malware family:
quasar
Score:
10/10
Tags:
family:quasar botnet:gs ratter spyware stealer suricata trojan upx
Behaviour
Creates scheduled task(s)
Modifies registry class
Modifies system certificate store
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
UPX packed file
NirSoft WebBrowserPassView
Nirsoft
Quasar Payload
Quasar RAT
suricata: ET MALWARE Observed Malicious SSL Cert (Quasar CnC)
Malware Config
C2 Extraction:
45.14.50.120:8808
Unpacked files
SH256 hash:
56e8830fa7e0194a01177b00749c8c2aba6c968a9c8ca4d94f39763da800b8b2
MD5 hash:
1b028d786a148e840ce254ec133658dd
SHA1 hash:
8cc9e0c8469e42d359b31b5d2e708a6e1c05c64f
SH256 hash:
f4fb42c8312a6002a8783e2a1ab4571eb89e92cd192b1a21e8c4582205c37312
MD5 hash:
88ab0bb59b0b20816a833ba91c1606d3
SHA1 hash:
72c09b7789a4bac8fee41227d101daed8437edeb
SH256 hash:
b4401e082c3eb9275a7be41c333f1d7ee13894dff4f794dc3544f8397990e35e
MD5 hash:
a86d1b872c7339cc73f7a6c602b0166a
SHA1 hash:
fd0f8618acbfff4ceb0743b468976879f24dec88
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
iSpy Keylogger
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.