MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bc4e182a67ef54493ae2f5de8e977025df1af799b59b6b79ec17d178edf38cca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 8


Intelligence 8 IOCs YARA 6 File information Comments

SHA256 hash: bc4e182a67ef54493ae2f5de8e977025df1af799b59b6b79ec17d178edf38cca
SHA3-384 hash: b0daa8d029c30f24b662af03c3d6ef7ddfe9aabd3745e9dc4bf0217dcea12e814df86ee981362ba70c23ac3af7122853
SHA1 hash: 6053dc034102e10241aa3dc8b2e52de3b7a50fb4
MD5 hash: b0c823de2da5b82379f2712cfb850366
humanhash: golf-salami-nebraska-artist
File name:bc4e182a67ef54493ae2f5de8e977025df1af799b59b6b79ec17d178edf38cca
Download: download sample
Signature QuasarRAT
File size:12'123'648 bytes
First seen:2020-11-14 17:52:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 04309777717f66edfcaa1cd1e43b4905 (3 x QuasarRAT, 2 x AgentTesla, 1 x Loki)
ssdeep 196608:Kp2E79/1HwnkBmNEOWT4amFsy03PC4WgVWq/7090YJ+x8YzjzFNF/:KD7916k2umFRAp4K090YJ+BzP9
TLSH 4FC6331363B04837C1B6197E8D37727459F07D42B9E9EB671AE06C6C2E323895D1A3A3
Reporter seifreed
Tags:QuasarRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
97
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Using the Windows Management Instrumentation requests
DNS request
Sending an HTTP GET request
Creating a file in the Windows subdirectories
Launching a process
Enabling the 'hidden' option for recently created files
Creating a file
Setting a keyboard event handler
Creating a file in the %AppData% subdirectories
Unauthorized injection to a recently created process
Connection attempt to an infection source
Changing the hosts file
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Result
Threat name:
Quasar Xmrig
Detection:
malicious
Classification:
troj.adwa.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies the hosts file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
System process connects to network (likely due to code injection or exploit)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Quasar RAT
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 317268 Sample: M5tzeNIe5t Startdate: 15/11/2020 Architecture: WINDOWS Score: 100 44 Malicious sample detected (through community Yara rule) 2->44 46 Antivirus / Scanner detection for submitted sample 2->46 48 Multi AV Scanner detection for submitted file 2->48 50 10 other signatures 2->50 9 M5tzeNIe5t.exe 2 2->9         started        process3 file4 32 C:\Users\user\AppData\Local\...\svchost.exe, PE32 9->32 dropped 60 Detected unpacking (changes PE section rights) 9->60 62 Detected unpacking (creates a PE file in dynamic memory) 9->62 64 Detected unpacking (overwrites its own PE header) 9->64 66 2 other signatures 9->66 13 svchost.exe 15 5 9->13         started        18 M5tzeNIe5t.exe 2 9->18         started        signatures5 process6 dnsIp7 42 ip-api.com 208.95.112.1, 49723, 49724, 80 TUT-ASUS United States 13->42 34 C:\Windows\SysWOW64\svchost\svchosts.exe, PE32 13->34 dropped 68 Antivirus detection for dropped file 13->68 70 System process connects to network (likely due to code injection or exploit) 13->70 72 Multi AV Scanner detection for dropped file 13->72 76 3 other signatures 13->76 20 svchosts.exe 14 4 13->20         started        24 schtasks.exe 1 13->24         started        36 C:\Windows\System32\drivers\etc\hosts, ASCII 18->36 dropped 74 Modifies the hosts file 18->74 file8 signatures9 process10 dnsIp11 38 allahoyunda.duckdns.org 192.169.69.25, 1604 WOWUS United States 20->38 40 ip-api.com 20->40 52 Antivirus detection for dropped file 20->52 54 Multi AV Scanner detection for dropped file 20->54 56 Machine Learning detection for dropped file 20->56 58 2 other signatures 20->58 26 schtasks.exe 1 20->26         started        28 conhost.exe 24->28         started        signatures12 process13 process14 30 conhost.exe 26->30         started       
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-11-14 17:53:31 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar spyware trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Suspicious use of SetThreadContext
Looks up external IP address via web service
Loads dropped DLL
Drops file in Drivers directory
Executes dropped EXE
Quasar RAT
Unpacked files
SH256 hash:
bc4e182a67ef54493ae2f5de8e977025df1af799b59b6b79ec17d178edf38cca
MD5 hash:
b0c823de2da5b82379f2712cfb850366
SHA1 hash:
6053dc034102e10241aa3dc8b2e52de3b7a50fb4
SH256 hash:
6fd2565708db5e09e6f9705ca0cee833e4fc05d1fbd0a94d03c44f6bcf7184ae
MD5 hash:
a67f30fe3a1496c97c8aa88c85e5acd5
SHA1 hash:
2b525763da876fca3979e042044db220d5c29a72
SH256 hash:
3d328b8e3c6b14b220eba63809b298554319bad22c935e2b42a48d211b40bc1b
MD5 hash:
ffbb28eba7bc30ee36983ee1aa01c6c8
SHA1 hash:
8e7b19860ba9cef794bd4f43d742c992c7e98d05
SH256 hash:
15cbf4a8df0a14a56ef3521d050487f131df351099665a52e3d7a4f0dc2439a0
MD5 hash:
1b79c56cdd12b4b8bf2655ce7f229ae0
SHA1 hash:
ccdd2c592b944c32e2b97998c11f7f8918d5f47f
SH256 hash:
2a5e1d60a873c67f81c2f7b1d323db79ad5fa387cc30d51f293a1e0fc2f77c33
MD5 hash:
3fcb270a0bee645587a4f6c62913fcc6
SHA1 hash:
f47f15841e40357e77fbad9049e1b350f3bfb54b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MSILStealer
Author:https://github.com/hwvs
Description:Detects strings from C#/VB Stealers and QuasarRat
Reference:https://github.com/quasar/QuasarRAT
Rule name:Quasar
Author:JPCERT/CC Incident Response Group
Description:detect QuasarRAT in memory
Rule name:Quasar_RAT_1
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments