MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d65862ab1d8dfcba06ab6e1fc40d109d9c644cac4e02ef0c8fb30f96ec199b61. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 22 File information Comments

SHA256 hash: d65862ab1d8dfcba06ab6e1fc40d109d9c644cac4e02ef0c8fb30f96ec199b61
SHA3-384 hash: e91ba6c36f64cadae02ce2b542457be7b4dcc5ec1cba8e04c550966737fad14516a904206c444f0067c8836c37faf0c4
SHA1 hash: bd6ddfad9434df868f935657b50f00c03eadf04b
MD5 hash: d7b8cf49c37ef4cedb481ea114fbc9e3
humanhash: monkey-neptune-quiet-oxygen
File name:SecuriteInfo.com.BackDoor.Rat.532.19245.6269
Download: download sample
Signature QuasarRAT
File size:3'868'672 bytes
First seen:2025-05-20 09:55:46 UTC
Last seen:2025-05-20 10:25:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 98304:ah1iMoXVuBhWKbGYw2h8nN35EK9sYoRs7RuO:a61FuBhWKbOe8nN4WwO
TLSH T1460623CC3A6076EEC503D97299695C74EB106CAF971B2117A0037DABBA7D803DF250B6
TrID 28.5% (.EXE) Win64 Executable (generic) (10522/11/4)
17.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
13.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
12.2% (.EXE) Win32 Executable (generic) (4504/4/1)
5.6% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
dhash icon 78c0db4cea7aa0fc (33 x AveMariaRAT, 23 x QuasarRAT, 1 x Loki)
Reporter SecuriteInfoCom
Tags:exe QuasarRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
365
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ODEME.txtx.lnk
Verdict:
Malicious activity
Analysis date:
2025-05-20 09:03:53 UTC
Tags:
loader auto-reg confuser crypto-regex

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
autorun packed spawn sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Creating a window
Сreating synchronization primitives
Creating a file in the %AppData% subdirectories
Launching a process
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
base64 confuser confuserex net obfuscated obfuscated packed packed packer_detected
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1694802 Sample: SecuriteInfo.com.BackDoor.R... Startdate: 20/05/2025 Architecture: WINDOWS Score: 100 58 mjoatboating.ydns.eu 2->58 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 Antivirus / Scanner detection for submitted sample 2->68 70 8 other signatures 2->70 11 SecuriteInfo.com.BackDoor.Rat.532.19245.6269.exe 1 2->11         started        15 Client.exe 2->15         started        signatures3 process4 file5 56 SecuriteInfo.com.B....19245.6269.exe.log, ASCII 11->56 dropped 74 Detected unpacking (changes PE section rights) 11->74 76 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->76 78 Uses schtasks.exe or at.exe to add and modify task schedules 11->78 17 SecuriteInfo.com.BackDoor.Rat.532.19245.6269.exe 4 11->17         started        21 SecuriteInfo.com.BackDoor.Rat.532.19245.6269.exe 11->21         started        23 WerFault.exe 2 11->23         started        80 Injects a PE file into a foreign processes 15->80 25 Client.exe 15->25         started        27 Client.exe 15->27         started        29 SgrmBroker.exe 15->29         started        signatures6 process7 file8 54 C:\Users\user\AppData\Roaming\...\Client.exe, PE32 17->54 dropped 62 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->62 31 Client.exe 1 17->31         started        34 schtasks.exe 1 17->34         started        36 WerFault.exe 19 18 21->36         started        38 WerFault.exe 25->38         started        signatures9 process10 signatures11 82 Antivirus detection for dropped file 31->82 84 Multi AV Scanner detection for dropped file 31->84 40 Client.exe 2 31->40         started        44 Client.exe 31->44         started        46 conhost.exe 34->46         started        process12 dnsIp13 60 mjoatboating.ydns.eu 196.251.117.236, 4785, 49700, 49709 xneeloZA Seychelles 40->60 72 Hides that the sample has been downloaded from the Internet (zone.identifier) 40->72 48 schtasks.exe 40->48         started        50 WerFault.exe 19 18 44->50         started        signatures14 process15 process16 52 conhost.exe 48->52         started       
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-05-20 09:56:24 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
31 of 38 (81.58%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
quasarrat
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:quasar botnet:office04 discovery spyware trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Executes dropped EXE
Quasar RAT
Quasar family
Quasar payload
Malware Config
C2 Extraction:
mjoatboating.ydns.eu:4785
Unpacked files
SH256 hash:
d65862ab1d8dfcba06ab6e1fc40d109d9c644cac4e02ef0c8fb30f96ec199b61
MD5 hash:
d7b8cf49c37ef4cedb481ea114fbc9e3
SHA1 hash:
bd6ddfad9434df868f935657b50f00c03eadf04b
SH256 hash:
a8395a5ffa33d22c87ddb61d345f70244822c8a1ca874a58e1a872d147715b11
MD5 hash:
7d70830289c3014b918740efc196f459
SHA1 hash:
04f260b9e80c094e7e82adb958f3fb120a290c8e
Detections:
QuasarRAT cn_utf8_windows_terminal malware_windows_xrat_quasarrat MAL_QuasarRAT_May19_1 MAL_BackNet_Nov18_1 INDICATOR_EXE_Packed_Fody INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
SH256 hash:
706bddfccae10f8edbb3a6da9fd3c58cf64b8c575d0e1653c661283556f5d7be
MD5 hash:
73517bc54c36b126e7fb448116c4949f
SHA1 hash:
95f1d6a0983476c9e6fdcc2a537ba34030203ccd
SH256 hash:
377c8c8d8f7a040c882e55169b5e889ff0b96c0cf8fe0ff87e6fbff216ec0964
MD5 hash:
345b5af7e6c2ff01747b6a63b9caebac
SHA1 hash:
c40d5f150103bbd2a999b1954300b3b6a1d43da6
Detections:
SUSP_NET_NAME_ConfuserEx INDICATOR_EXE_Packed_ConfuserEx INDICATOR_EXE_Packed_ConfuserEx_Custom
SH256 hash:
f49677a0d991bbd04b9672a0b4702a57b3c6884aec592ae5888b1639c490abc7
MD5 hash:
4fe8d07a14f667fa160a5e9bf23c6463
SHA1 hash:
d31f21b454b91d7bb39d6a7809451e6711cc3c2c
SH256 hash:
a55490720ed6e45338b61461def98056a90499fcb733d836a97f2f869b2bb008
MD5 hash:
8ed914c052315685dc63b2842a7416a8
SHA1 hash:
1717a8ce957547e69b6ca81a65d4a25fe18c2396
SH256 hash:
4c9615496970ea84320e2a6e99f8fb828e3c7790384df5585d93fc368885d94e
MD5 hash:
50e6524b7ee9c2c93f5210b63cb1ca54
SHA1 hash:
3e296ec3bb24750833ea80515e6fb4c73874c91a
SH256 hash:
0bcaaffce18bce9f5efcc10978d5a6aaf9bda865644041b86d38f51a12f699f1
MD5 hash:
7ab3fd18e6d798e7f62e95aa55725b58
SHA1 hash:
4f4b6f0d5b67398d3bb9a06245bd7fe0cb4e9569
SH256 hash:
bc0243134c93c55ea105d0e9c2a43b6030e973290d0a061cf3a61986a2268a88
MD5 hash:
d2edde626c241549eab636aa87fb5d38
SHA1 hash:
8d836febd477b3ec44cc37f4f0aecdaa1d7db788
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_Dlls
Rule name:Costura_Protobuf
Author:@bartblaze
Description:Identifies Costura and Protobuf in .NET assemblies, respectively for storing resources and (de)serialization. Seen together might indicate a suspect binary.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:INDICATOR_EXE_Packed_ConfuserEx_Custom
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Custom; outside of GIT
Rule name:INDICATOR_EXE_Packed_Fody
Author:ditekSHen
Description:Detects executables manipulated with Fody
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL
Author:ditekSHen
Description:Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
Rule name:MAL_BackNet_Nov18_1
Author:Florian Roth (Nextron Systems)
Description:Detects BackNet samples
Reference:https://github.com/valsov/BackNet
Rule name:MAL_BackNet_Nov18_1_RID2D6D
Author:Florian Roth
Description:Detects BackNet samples
Reference:https://github.com/valsov/BackNet
Rule name:MAL_QuasarRAT_May19_1
Author:Florian Roth (Nextron Systems)
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:MAL_QuasarRAT_May19_1_RID2E1E
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

QuasarRAT

Executable exe d65862ab1d8dfcba06ab6e1fc40d109d9c644cac4e02ef0c8fb30f96ec199b61

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments