MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b85d366a889518edf0a9899e2120de042965a72fc60c8795a2f9bd6eee96d58c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 18 File information Comments

SHA256 hash: b85d366a889518edf0a9899e2120de042965a72fc60c8795a2f9bd6eee96d58c
SHA3-384 hash: 9cb1d5d4cd7a5a672944739c2ea251f911e5107811d4619c4a87e8044ec9af799b31b8d294855103bb47a757bb79e076
SHA1 hash: c9ae2a74d0e25e0d2c4946917767d46d33e208cc
MD5 hash: 42501e281de15d0331a70d0b34b94b8b
humanhash: fruit-muppet-burger-oven
File name:42501e281de15d0331a70d0b34b94b8b.exe
Download: download sample
Signature QuasarRAT
File size:356'352 bytes
First seen:2022-09-22 08:58:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'854 x AgentTesla, 19'783 x Formbook, 12'304 x SnakeKeylogger)
ssdeep 6144:j+NHXf500Mh9fsD02Sp1bS6Zh4SRy80WUw7K:yd50ODqhZh4SYXw7K
TLSH T18A747B1373E4ED3BD1BE273AF43206154BB4D40ABA16E38B5A5855F92D233868D803B7
TrID 53.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
12.2% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
9.6% (.SCR) Windows screen saver (13101/52/3)
7.7% (.EXE) Win64 Executable (generic) (10523/12/4)
4.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
Reporter abuse_ch
Tags:exe QuasarRAT RAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
251
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
invoice554684093903ye74674.exe
Verdict:
Malicious activity
Analysis date:
2022-09-21 15:00:38 UTC
Tags:
loader rat quasar opendir evasion trojan nanocore

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
DNS request
Sending an HTTP GET request
Launching a process
Setting a keyboard event handler
Creating a file in the %AppData% subdirectories
Creating a window
Creating a file in the %temp% directory
Running batch commands
Creating a process with a hidden window
Sending a custom TCP request
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Creating a file
Unauthorized injection to a recently created process
Searching for the window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm fingerprint keylogger packed quasar quasarrat rat shell32.dll stealer stealer vermin xrat
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 707670 Sample: PRmzz7pHPi.exe Startdate: 22/09/2022 Architecture: WINDOWS Score: 100 118 mill.hopto.org 2->118 120 ip-api.com 2->120 154 Snort IDS alert for network traffic 2->154 156 Multi AV Scanner detection for domain / URL 2->156 158 Malicious sample detected (through community Yara rule) 2->158 160 8 other signatures 2->160 15 PRmzz7pHPi.exe 15 6 2->15         started        19 PRmzz7pHPi.exe 3 2->19         started        signatures3 process4 dnsIp5 140 mill.hopto.org 15->140 142 ip-api.com 208.95.112.1, 49704, 49709, 49711 TUT-ASUS United States 15->142 144 May check the online IP address of the machine 15->144 146 Uses schtasks.exe or at.exe to add and modify task schedules 15->146 148 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->148 150 Installs a global keyboard hook 15->150 22 cmd.exe 1 15->22         started        25 WerFault.exe 23 9 15->25         started        28 schtasks.exe 1 15->28         started        108 C:\Users\user\AppData\...\PRmzz7pHPi.exe.log, ASCII 19->108 dropped file6 signatures7 process8 file9 166 Uses ping.exe to sleep 22->166 168 Uses ping.exe to check the status of other devices and networks 22->168 30 PRmzz7pHPi.exe 4 22->30         started        34 conhost.exe 22->34         started        36 PING.EXE 1 22->36         started        38 chcp.com 1 22->38         started        112 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 25->112 dropped 40 conhost.exe 28->40         started        signatures10 process11 dnsIp12 130 mill.hopto.org 30->130 132 ip-api.com 30->132 178 Hides that the sample has been downloaded from the Internet (zone.identifier) 30->178 180 Installs a global keyboard hook 30->180 42 cmd.exe 1 30->42         started        45 WerFault.exe 30->45         started        48 schtasks.exe 1 30->48         started        50 MpCmdRun.exe 30->50         started        signatures13 process14 file15 172 Uses ping.exe to sleep 42->172 52 PRmzz7pHPi.exe 42->52         started        56 conhost.exe 42->56         started        58 PING.EXE 1 42->58         started        60 chcp.com 1 42->60         started        116 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 45->116 dropped 62 conhost.exe 48->62         started        64 conhost.exe 50->64         started        signatures16 process17 dnsIp18 122 mill.hopto.org 52->122 124 ip-api.com 52->124 162 Hides that the sample has been downloaded from the Internet (zone.identifier) 52->162 164 Installs a global keyboard hook 52->164 66 cmd.exe 52->66         started        69 WerFault.exe 52->69         started        72 schtasks.exe 52->72         started        signatures19 process20 file21 152 Uses ping.exe to sleep 66->152 74 PRmzz7pHPi.exe 66->74         started        78 conhost.exe 66->78         started        80 chcp.com 66->80         started        82 PING.EXE 66->82         started        110 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 69->110 dropped 84 conhost.exe 72->84         started        signatures22 process23 dnsIp24 126 mill.hopto.org 74->126 128 ip-api.com 74->128 174 Hides that the sample has been downloaded from the Internet (zone.identifier) 74->174 176 Installs a global keyboard hook 74->176 86 cmd.exe 74->86         started        89 WerFault.exe 74->89         started        92 schtasks.exe 74->92         started        signatures25 process26 file27 170 Uses ping.exe to sleep 86->170 94 PRmzz7pHPi.exe 86->94         started        98 PING.EXE 86->98         started        100 conhost.exe 86->100         started        102 chcp.com 86->102         started        114 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 89->114 dropped 104 conhost.exe 92->104         started        signatures28 process29 dnsIp30 134 mill.hopto.org 94->134 136 ip-api.com 94->136 182 Hides that the sample has been downloaded from the Internet (zone.identifier) 94->182 184 Installs a global keyboard hook 94->184 106 schtasks.exe 94->106         started        138 192.168.2.1 unknown unknown 98->138 signatures31 process32
Threat name:
ByteCode-MSIL.Trojan.Quasar
Status:
Malicious
First seen:
2022-09-21 17:08:25 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
26 of 26 (100.00%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:quasar botnet:godbless my hustle spyware trojan
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Enumerates system info in registry
Runs ping.exe
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in System32 directory
Looks up external IP address via web service
Checks computer location settings
Quasar RAT
Quasar payload
Malware Config
C2 Extraction:
mill.hopto.org:7773
Unpacked files
SH256 hash:
b85d366a889518edf0a9899e2120de042965a72fc60c8795a2f9bd6eee96d58c
MD5 hash:
42501e281de15d0331a70d0b34b94b8b
SHA1 hash:
c9ae2a74d0e25e0d2c4946917767d46d33e208cc
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CN_disclosed_20180208_KeyLogger_1
Author:Florian Roth
Description:Detects malware from disclosed CN malware set
Reference:https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details
Rule name:CN_disclosed_20180208_KeyLogger_1_RID3227
Author:Florian Roth
Description:Detects malware from disclosed CN malware set
Reference:https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_GENInfoStealer
Author:ditekSHen
Description:Detects executables containing common artifcats observed in infostealers
Rule name:malware_Quasar_strings
Author:JPCERT/CC Incident Response Group
Description:detect QuasarRAT in memory
Rule name:MALWARE_Win_QuasarRAT
Author:ditekSHen
Description:QuasarRAT payload
Rule name:MAL_QuasarRAT_May19_1
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:MAL_QuasarRAT_May19_1_RID2E1E
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:pe_imphash
Rule name:Quasar_RAT_1
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:Quasar_RAT_1_RID2B54
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:Quasar_RAT_2
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:Quasar_RAT_2_RID2B55
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:RansomwareTest6
Author:Daoyuan Wu
Description:Test Ransomware YARA rules
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Vermin_Keylogger_Jan18_1
Author:Florian Roth
Description:Detects Vermin Keylogger
Reference:https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/
Rule name:xRAT_1
Author:Florian Roth
Description:Detects Patchwork malware
Reference:https://goo.gl/Pg3P4W
Rule name:xRAT_1_RID2900
Author:Florian Roth
Description:Detects Patchwork malware
Reference:https://goo.gl/Pg3P4W

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments