MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d369c2c5febce0ef6d1a5267058ba5644c63fd989639b8c50fb1209efa0e4e34. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 17


Intelligence 17 IOCs YARA 9 File information Comments

SHA256 hash: d369c2c5febce0ef6d1a5267058ba5644c63fd989639b8c50fb1209efa0e4e34
SHA3-384 hash: 950f51f2488647c1af6bf848e0df5c9b6194d081734b3c5e2743929153ec7cfb4f8d71770902c197e9fb146285fbe753
SHA1 hash: 6c2f8e01ec58fe6853717db583ce598aafa3b495
MD5 hash: 0dbe846477110b7e54c4bacd94fd67ce
humanhash: virginia-august-neptune-missouri
File name:RUUHT55.exe
Download: download sample
Signature QuasarRAT
File size:464'004 bytes
First seen:2025-09-07 07:06:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 492a5d3560401c2811de048088bf91d0 (4 x DonutLoader, 2 x HijackLoader, 1 x QuasarRAT)
ssdeep 6144:DAypg+DmIlwqMP5K9KK+W8eyORdaZ1yGDo/srEYVYzl1Y:j57wqegcvWDLdaLyTCYznY
Threatray 1'383 similar samples on MalwareBazaar
TLSH T18FA47D19EBE505F9E0B7D574CEA24802EB727C4E0771ABCF13A049A61F276909E3D712
TrID 92.4% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.6% (.EXE) Win64 Executable (generic) (10522/11/4)
1.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
0.7% (.EXE) OS/2 Executable (generic) (2029/13)
0.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter smica83
Tags:exe QuasarRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
RUUHT55.exe
Verdict:
Malicious activity
Analysis date:
2025-09-07 07:09:50 UTC
Tags:
github auto-sch susp-powershell quasar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
obfuscate xtreme shell
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% directory
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Launching a process
DNS request
Connection attempt
Sending a custom TCP request
Creating a file in the system32 subdirectories
Enabling the 'hidden' option for recently created files
Creating a file
Setting a keyboard event handler
Unauthorized injection to a recently created process
Adding an exclusion to Microsoft Defender
Adding exclusions to Windows Defender
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 base64 dropper evasive fingerprint infostealer microsoft_visual_cc obfuscated overlay powershell reconnaissance stealer stealer tiger
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-09-06T23:57:00Z UTC
Last seen:
2025-09-06T23:57:00Z UTC
Hits:
~10
Result
Threat name:
AsyncRAT, Quasar
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Adds extensions / path to Windows Defender exclusion list (Registry)
Antivirus detection for dropped file
Connects to many ports of the same IP (likely port scanning)
Drops executables to the windows directory (C:\Windows) and starts them
Encrypted powershell cmdline option found
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
PowerShell case anomaly found
Powershell drops PE file
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Yara detected AsyncRAT
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1772540 Sample: RUUHT55.exe Startdate: 07/09/2025 Architecture: WINDOWS Score: 100 65 anonam39-21749.portmap.io 2->65 67 raw.githubusercontent.com 2->67 69 github.com 2->69 89 Found malware configuration 2->89 91 Malicious sample detected (through community Yara rule) 2->91 93 Yara detected Quasar RAT 2->93 95 9 other signatures 2->95 14 RUUHT55.exe 3 9 2->14         started        17 ShellHost.exe 2->17         started        signatures3 process4 file5 61 C:\Users\user\AppData\Local\Temp\Am.vbs, ASCII 14->61 dropped 19 wscript.exe 1 14->19         started        process6 signatures7 97 Wscript starts Powershell (via cmd or directly) 19->97 99 Windows Scripting host queries suspicious COM object (likely to drop second stage) 19->99 101 Suspicious execution chain found 19->101 22 cmd.exe 1 19->22         started        process8 signatures9 103 Wscript starts Powershell (via cmd or directly) 22->103 105 Encrypted powershell cmdline option found 22->105 107 PowerShell case anomaly found 22->107 25 powershell.exe 15 22->25         started        28 conhost.exe 22->28         started        process10 signatures11 109 Uses cmd line tools excessively to alter registry or file data 25->109 111 Adds a directory exclusion to Windows Defender 25->111 113 Powershell drops PE file 25->113 30 powershell.exe 14 17 25->30         started        34 powershell.exe 23 25->34         started        37 reg.exe 1 1 25->37         started        39 2 other processes 25->39 process12 dnsIp13 71 github.com 140.82.112.3, 443, 49690 GITHUBUS United States 30->71 73 raw.githubusercontent.com 185.199.110.133, 443, 49691 FASTLYUS Netherlands 30->73 63 C:\Users\user\AppData\Local\...\ShellHost.exe, PE32 30->63 dropped 41 ShellHost.exe 5 30->41         started        85 Loading BitLocker PowerShell Module 34->85 45 WmiPrvSE.exe 34->45         started        87 Adds extensions / path to Windows Defender exclusion list (Registry) 37->87 file14 signatures15 process16 file17 59 C:\Windows\System32\a7\ShellHost.exe, PE32 41->59 dropped 115 Antivirus detection for dropped file 41->115 117 Multi AV Scanner detection for dropped file 41->117 119 Drops executables to the windows directory (C:\Windows) and starts them 41->119 121 2 other signatures 41->121 47 ShellHost.exe 41->47         started        51 schtasks.exe 41->51         started        signatures18 process19 dnsIp20 75 anonam39-21749.portmap.io 193.161.193.99, 21749, 49695, 49696 BITREE-ASRU Russian Federation 47->75 77 Antivirus detection for dropped file 47->77 79 Multi AV Scanner detection for dropped file 47->79 81 Hides that the sample has been downloaded from the Internet (zone.identifier) 47->81 83 Installs a global keyboard hook 47->83 53 schtasks.exe 47->53         started        55 conhost.exe 51->55         started        signatures21 process22 process23 57 conhost.exe 53->57         started       
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Nekark
Status:
Malicious
First seen:
2025-09-07 04:36:44 UTC
File Type:
PE+ (Exe)
Extracted files:
8
AV detection:
14 of 38 (36.84%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar botnet:shellhost defense_evasion execution persistence spyware trojan
Behaviour
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Drops file in System32 directory
Indicator Removal: File Deletion
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Executes dropped EXE
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Quasar RAT
Quasar family
Quasar payload
Malware Config
C2 Extraction:
anonam39-21749.portmap.io:21749
Unpacked files
SH256 hash:
d369c2c5febce0ef6d1a5267058ba5644c63fd989639b8c50fb1209efa0e4e34
MD5 hash:
0dbe846477110b7e54c4bacd94fd67ce
SHA1 hash:
6c2f8e01ec58fe6853717db583ce598aafa3b495
Malware family:
QuasarRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments