MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d93f7cb5d7e03bdc168bcf05ca7e1fdeb46f6c9d56c1b7508912db0e4ac0f45f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: d93f7cb5d7e03bdc168bcf05ca7e1fdeb46f6c9d56c1b7508912db0e4ac0f45f
SHA3-384 hash: 6a183304dde674391028ea79e32fab48987ee25426111f819bcf54cb68328f908bf392a7de59aa12d2ee8f3892dd5ea4
SHA1 hash: 7fe90575b66b1ffd0a2a2b43edbde5932ea65a79
MD5 hash: 8bfc169a02c9f443d92d8420a49316a5
humanhash: zulu-carpet-harry-kansas
File name:d93f7cb5d7e03bdc168bcf05ca7e1fdeb46f6c9d56c1b7508912db0e4ac0f45f.hta
Download: download sample
Signature QuasarRAT
File size:14'090 bytes
First seen:2026-03-31 12:11:23 UTC
Last seen:2026-03-31 12:48:22 UTC
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 384:CVyn2ZF5Rf2uFumGFkUzFlP57ALTQGJrNO6JTQoYQgd9NcjrG13egTnFSWsu9d3D:CVwIw
TLSH T19452782C09BDFA5993D9E307E699F7236D461CAFD2B975172AF38C68A0024C045EB4C7
Magika html
Reporter JAMESWT_WT
Tags:checkmarx-zone fflexus-45433-portmap-host github-com--ashduasdoasdoasd hta QuasarRAT teampcp

Intelligence


File Origin
# of uploads :
2
# of downloads :
37
Origin country :
IT IT
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Score:
90.2%
Tags:
obfuscate xtreme sage
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 powershell
Verdict:
Malicious
File Type:
hta
First seen:
2026-03-30T11:27:00Z UTC
Last seen:
2026-03-31T08:00:00Z UTC
Hits:
~10
Detections:
Trojan-Downloader.Win32.Bitser.sb HEUR:Trojan.Script.Generic HEUR:Trojan.MSIL.Convagent.gen Backdoor.Win64.AdaptixC2.sb Backdoor.MSIL.PulsarRAT.sb Trojan.Win32.Inject.sb Trojan.MSIL.Agent.sb HEUR:Trojan-Banker.MSIL.ClipBanker.gen Trojan-Downloader.JS.SLoad.sb Trojan.JS.SAgent.sb HEUR:Trojan.Win32.Agentb.gen Trojan-PSW.MSIL.Agent.sb PDM:Exploit.Win32.Generic PDM:Trojan.Win32.Generic HEUR:Trojan.Win32.Generic VHO:Trojan-Downloader.MSIL.ShortLoader.gen
Gathering data
Threat name:
Script-WScript.Trojan.Electryon
Status:
Malicious
First seen:
2026-03-30 14:21:12 UTC
File Type:
Text (VBS)
AV detection:
10 of 36 (27.78%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar discovery dropper execution persistence spyware trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Contacts third-party web service commonly abused for C2
Checks computer location settings
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
Download via BitsAdmin
Downloads MZ/PE file
Quasar RAT
Quasar family
Quasar payload
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments