MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d65862ab1d8dfcba06ab6e1fc40d109d9c644cac4e02ef0c8fb30f96ec199b61. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
QuasarRAT
Vendor detections: 14
| SHA256 hash: | d65862ab1d8dfcba06ab6e1fc40d109d9c644cac4e02ef0c8fb30f96ec199b61 |
|---|---|
| SHA3-384 hash: | e91ba6c36f64cadae02ce2b542457be7b4dcc5ec1cba8e04c550966737fad14516a904206c444f0067c8836c37faf0c4 |
| SHA1 hash: | bd6ddfad9434df868f935657b50f00c03eadf04b |
| MD5 hash: | d7b8cf49c37ef4cedb481ea114fbc9e3 |
| humanhash: | monkey-neptune-quiet-oxygen |
| File name: | SecuriteInfo.com.BackDoor.Rat.532.19245.6269 |
| Download: | download sample |
| Signature | QuasarRAT |
| File size: | 3'868'672 bytes |
| First seen: | 2025-05-20 09:55:46 UTC |
| Last seen: | 2025-05-20 10:25:26 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger) |
| ssdeep | 98304:ah1iMoXVuBhWKbGYw2h8nN35EK9sYoRs7RuO:a61FuBhWKbOe8nN4WwO |
| TLSH | T1460623CC3A6076EEC503D97299695C74EB106CAF971B2117A0037DABBA7D803DF250B6 |
| TrID | 28.5% (.EXE) Win64 Executable (generic) (10522/11/4) 17.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 13.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 12.2% (.EXE) Win32 Executable (generic) (4504/4/1) 5.6% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Magika | pebin |
| dhash icon | 78c0db4cea7aa0fc (33 x AveMariaRAT, 23 x QuasarRAT, 1 x Loki) |
| Reporter | |
| Tags: | exe QuasarRAT |
Intelligence
File Origin
FRVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Check_Dlls |
|---|
| Rule name: | Costura_Protobuf |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies Costura and Protobuf in .NET assemblies, respectively for storing resources and (de)serialization. Seen together might indicate a suspect binary. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Thread |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | Detect_PowerShell_Obfuscation |
|---|---|
| Author: | daniyyell |
| Description: | Detects obfuscated PowerShell commands commonly used in malicious scripts. |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx_Custom |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Custom; outside of GIT |
| Rule name: | INDICATOR_EXE_Packed_Fody |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables manipulated with Fody |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Windows executables referencing non-Windows User-Agents |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion |
| Rule name: | MAL_BackNet_Nov18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects BackNet samples |
| Reference: | https://github.com/valsov/BackNet |
| Rule name: | MAL_BackNet_Nov18_1_RID2D6D |
|---|---|
| Author: | Florian Roth |
| Description: | Detects BackNet samples |
| Reference: | https://github.com/valsov/BackNet |
| Rule name: | MAL_QuasarRAT_May19_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects QuasarRAT malware |
| Reference: | https://blog.ensilo.com/uncovering-new-activity-by-apt10 |
| Rule name: | MAL_QuasarRAT_May19_1_RID2E1E |
|---|---|
| Author: | Florian Roth |
| Description: | Detects QuasarRAT malware |
| Reference: | https://blog.ensilo.com/uncovering-new-activity-by-apt10 |
| Rule name: | Multifamily_RAT_Detection |
|---|---|
| Author: | Lucas Acha (http://www.lukeacha.com) |
| Description: | Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.