MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d60d262c977449b351a9f74c888b3645fd01738132701ae9e9fdcc3806c9b825. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: d60d262c977449b351a9f74c888b3645fd01738132701ae9e9fdcc3806c9b825
SHA3-384 hash: 6b17590781a78c5de1354cb5a3a8cae1b546f3f8b1c16343a2806b18f1f5f188e5ad679e2ace77a6f46d5d81840bfb84
SHA1 hash: dd09c0c9e52ee33c09e830ee124da5502db088f1
MD5 hash: 29e798bb46b234adcd35d81d501332b2
humanhash: six-diet-salami-potato
File name:d60d262c977449b351a9f74c888b3645fd01738132701.exe
Download: download sample
Signature QuasarRAT
File size:11'932'160 bytes
First seen:2023-04-09 17:15:29 UTC
Last seen:2023-04-09 17:38:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a9c887a4f18a3fede2cc29ceea138ed3 (33 x CoinMiner, 17 x AsyncRAT, 15 x BlankGrabber)
ssdeep 196608:i/Vy7DKgHXroiR7USPF5BwFrFb5wXe4OLhSyjHTm:i/V0DfXUiR7USfBgb5wO4kTC
Threatray 126 similar samples on MalwareBazaar
TLSH T16CC612DBB0A89B7462D0D35BF2FC5299F09E50E3567B2DB49A0CF394ABA5FE1512C004
TrID 30.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
19.7% (.EXE) Win64 Executable (generic) (10523/12/4)
12.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.4% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe QuasarRAT RAT


Avatar
abuse_ch
QuasarRAT C2:
212.252.198.21:1337

Intelligence


File Origin
# of uploads :
2
# of downloads :
364
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
d60d262c977449b351a9f74c888b3645fd01738132701.exe
Verdict:
Malicious activity
Analysis date:
2023-04-09 17:16:16 UTC
Tags:
rat quasar trojan asyncrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Creating a file in the Windows directory
Creating a process from a recently created file
Creating a file in the %temp% subdirectories
Creating a window
Running batch commands
Sending a custom TCP request
Creating a file in the system32 directory
Launching the process to interact with network services
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
BSOD occurred
Launching a tool to kill processes
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
dcrat dde nitol packed razy tiny
Result
Verdict:
MALICIOUS
Result
Threat name:
Blank Grabber, Quasar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Encrypted powershell cmdline option found
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Blank Grabber
Yara detected Generic Downloader
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 843855 Sample: d60d262c977449b351a9f74c888... Startdate: 09/04/2023 Architecture: WINDOWS Score: 100 96 Malicious sample detected (through community Yara rule) 2->96 98 Antivirus / Scanner detection for submitted sample 2->98 100 Multi AV Scanner detection for submitted file 2->100 102 4 other signatures 2->102 10 d60d262c977449b351a9f74c888b3645fd01738132701.exe 3 2->10         started        14 CheckUpdate.exe 2 2->14         started        process3 file4 78 C:\Windows\SecurityHealthServices.exe, PE32 10->78 dropped 80 C:\Windows\RuntimeBroker.exe, PE32+ 10->80 dropped 118 Encrypted powershell cmdline option found 10->118 120 Drops executables to the windows directory (C:\Windows) and starts them 10->120 16 RuntimeBroker.exe 30 10->16         started        20 SecurityHealthServices.exe 4 10->20         started        22 powershell.exe 3 10->22         started        signatures5 process6 file7 68 C:\Users\user\AppData\...\VCRUNTIME140.dll, PE32+ 16->68 dropped 70 C:\Users\user\AppData\...\win32crypt.pyd, PE32+ 16->70 dropped 72 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 16->72 dropped 76 19 other files (none is malicious) 16->76 dropped 84 Multi AV Scanner detection for dropped file 16->84 86 May check the online IP address of the machine 16->86 88 Drops executables to the windows directory (C:\Windows) and starts them 16->88 90 Adds a directory exclusion to Windows Defender 16->90 24 RuntimeBroker.exe 16->24         started        74 C:\Windows\System32\CheckUpdate.exe, PE32 20->74 dropped 92 Uses schtasks.exe or at.exe to add and modify task schedules 20->92 94 Hides that the sample has been downloaded from the Internet (zone.identifier) 20->94 28 CheckUpdate.exe 2 20->28         started        30 schtasks.exe 1 20->30         started        32 conhost.exe 22->32         started        signatures8 process9 dnsIp10 82 ip-api.com 208.95.112.1, 49697, 80 TUT-ASUS United States 24->82 110 Adds a directory exclusion to Windows Defender 24->110 34 cmd.exe 1 24->34         started        37 cmd.exe 1 24->37         started        39 cmd.exe 24->39         started        45 5 other processes 24->45 112 Multi AV Scanner detection for dropped file 28->112 114 Hides that the sample has been downloaded from the Internet (zone.identifier) 28->114 116 Installs a global keyboard hook 28->116 41 schtasks.exe 28->41         started        43 conhost.exe 30->43         started        signatures11 process12 signatures13 104 Adds a directory exclusion to Windows Defender 34->104 47 net.exe 1 34->47         started        49 conhost.exe 34->49         started        51 powershell.exe 14 37->51         started        54 conhost.exe 37->54         started        56 conhost.exe 39->56         started        58 powershell.exe 39->58         started        60 conhost.exe 41->60         started        62 WMIC.exe 45->62         started        64 9 other processes 45->64 process14 signatures15 66 net1.exe 1 47->66         started        106 Hides that the sample has been downloaded from the Internet (zone.identifier) 51->106 108 DLL side loading technique detected 62->108 process16
Threat name:
Win32.Dropper.Dapato
Status:
Malicious
First seen:
2023-04-07 21:47:57 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
20 of 24 (83.33%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar botnet:updatesystem pyinstaller spyware trojan upx
Behaviour
Creates scheduled task(s)
Enumerates processes with tasklist
Kills process with taskkill
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Detects Pyinstaller
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
UPX packed file
Quasar RAT
Quasar payload
Malware Config
C2 Extraction:
bartu1337.duckdns.org:1337
Unpacked files
SH256 hash:
df60f6eb875d9681cc8853b5085a62f1f7a35fc9c687c2e9b16addbf00b65363
MD5 hash:
450a93113ba38b00faec4e2d72414888
SHA1 hash:
ae8ea2fedb45467846a72c0c49b3cf3a0907d083
Detections:
QuasarRAT
SH256 hash:
d60d262c977449b351a9f74c888b3645fd01738132701ae9e9fdcc3806c9b825
MD5 hash:
29e798bb46b234adcd35d81d501332b2
SHA1 hash:
dd09c0c9e52ee33c09e830ee124da5502db088f1
Malware family:
QuasarRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments