MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d9549ad3ed734261a0029adbed59926fed150f14d0e44fb85fa583a9fe6327f3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
QuasarRAT
Vendor detections: 9
| SHA256 hash: | d9549ad3ed734261a0029adbed59926fed150f14d0e44fb85fa583a9fe6327f3 |
|---|---|
| SHA3-384 hash: | 79e2b284d2b097d28e546290dc51faa1c51a9419d8f28dec57a533d4b3058b2e25f3541d743e97b043a806f1a051e8d0 |
| SHA1 hash: | 7ec02657e55ae021720eff31e5b6cc6a9ad7f3ae |
| MD5 hash: | f327a7c7345daf0200bc8700c02d4d1a |
| humanhash: | lima-oxygen-cardinal-network |
| File name: | d9549ad3ed734261a0029adbed59926fed150f14d0e44fb85fa583a9fe6327f3 |
| Download: | download sample |
| Signature | QuasarRAT |
| File size: | 2'110'792 bytes |
| First seen: | 2020-11-06 10:53:49 UTC |
| Last seen: | 2020-11-07 16:56:11 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | afcdf79be1557326c854b6e20cb900a7 (1'102 x FormBook, 936 x AgentTesla, 399 x RemcosRAT) |
| ssdeep | 24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYh:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yr |
| Threatray | 336 similar samples on MalwareBazaar |
| TLSH | C9A5BE41A3DC82A1CE6A4372BA36DB219B777C692634F70E1ED83D7A3E723521518353 |
| Reporter | |
| Tags: | QuasarRAT |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
ecb11a3ef61c5e48bc36f4dda326720913f71eeb26161e42c46b0b01cf4e8b3d
2c6ab1efe207f8a2f8528ce232dcd1e2ff0b0dd82c5b460f51457a7bf97f60d9
877106f8412be6c602573e6ece4b51e3dd4eaa33030946b9ae785ed9d19933a4
c9bff2976429c2bf5aaebb22ff100e6b11f6e60e2bd085463f1fa42a288c6618
3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78
ecb11a3ef61c5e48bc36f4dda326720913f71eeb26161e42c46b0b01cf4e8b3d
2c6ab1efe207f8a2f8528ce232dcd1e2ff0b0dd82c5b460f51457a7bf97f60d9
877106f8412be6c602573e6ece4b51e3dd4eaa33030946b9ae785ed9d19933a4
c9bff2976429c2bf5aaebb22ff100e6b11f6e60e2bd085463f1fa42a288c6618
3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78
9b6bd1205d9c3f35fd1e97d34e831af1454faa78338d22cdf507d255250259bc
d9549ad3ed734261a0029adbed59926fed150f14d0e44fb85fa583a9fe6327f3
9ab585c5c9aa389cb859ce05381200cf0949d9543a9634d2cfcde9ff65fe874e
d6925f01c421c035fb4cdb32f6d1c143eede807c8ff264c691501213af9c5aa0
f52d1fc9f4b66a779a6c8c35b63f58546933f40ad39d15287009f44b14986bcb
ff87441fe213e765819165032d00061e5ca6a94905f213e6a4798bd35273a7c3
4d93f781c3e7509fb4a1f962a1752c4d36e5243cae382db1cdcc4064086035c2
8f2ad0a7a9bcd06a6f4dffe37c5bcba72e653f9752c2af2fd22176416cbe12b5
ff1fe4e3fd829fd0146c1e15dbbff49e610e67b6cd55d8135233675c28431f77
e04f76e1a3dae89b31aa188c667e177f38abc85daf2ee7dccaac9d79a2c25f05
454709c8e3b81f6fe53cf0937bb361d951b8ea05706adb0c9ad90118a9c157ee
d3fb7826cbcb6f33fbfcd59d74d77040265017d512477fe34d61f6fb3880b90a
486224ce113ae629b279a03505bd035a762144f3573113e9ca199b4272508cad
ef7887e2a018cf7d973e731609c48c0600cb47329e526f5d6bf50636624c786c
c48cecba8431d80cfa7c6a46e6e7e49de8d031816c09505527874ce113f95df2
4bfc73e59f71614b6344622009eceee0c8b5c0ecb6f9e617676c6d4fe6b76024
cf3223c925614fb3b773a1f3048605b1424e6e954a42065ea4834bbba02abe6d
d4d6982ec8929bd7f596b1c32cc19f8d95430b7e8dafb3994de890761ba1e9de
f28325f4da5423889167b710090cc10a524341a4ae4cd31d6c011f77756d9e17
562b5b8f2b94be983e46ef2e851570371473c03e324d3d951014579c8f566042
5285fc4f59a5847a66117240c59925f42dd6e5c7a17c2e90c49234d7913b6afb
4839f576da58bcfd097c24c5c3ff4d72029377dfd450420e99b745b3deda62bc
8f44f9b4e0716329638b3cf4b2470df57e199e9b66bb58e225aa767d9d48dd7e
94f9f632bad9fa9d923de55c08186af273b060d05bd305212fce8ec782bdad7f
6bb7ee8547b6d468228ef89c407d4abaee8067f0edb58d626b10ff7aba6c1ef3
aa5a4440dab4909f58308d8c80a2d2a0b2edfb56aa4e60aa67e83e9203773a07
4ce95594d4b615d8612589de57a0df0dfc3d059f0bc61f7df4d2bbeefe5323e4
540108c43aa0ca447ad443bdae4995b45c4cb52f523f7c31908f6b062f931a04
07db5ffae9143270d00563a1b95b456633a7c2fa07fe26cbe138a7b233dff180
381c28bd8d6e3538bcdea645faa825012355305a2ea5df8ad4f526b3750484e5
1d4a50a04f528b48ae1eec907ffae079186843b16e29f1488ff3fbc5e9f253f0
afe362f2b4c796b7177aea8bd909fedbe9e22b07dcec38234a454c47264e6b82
96eb8d5baeb832fcb780f73a0528b1ac2a4ae5b6a91517d727e38443129db0a5
7035da8898c0867d775597910d50f55a1428bc4588558319f70b1b219cb067be
f8a421f5b3771603d633527896e9e5d9f566ad88ecfb4f7204c7482966a1653c
ee6cf94ca7b7652517a776b59b503a8cb8c4f30136a28a3967d14b6d8fdd3597
40981ed2079d1c26fa7b1fb1640aa315dfdebd128741fdc1e3629d0e470e9238
ac0c1890dabbd2f119231b92b9a5f4174de5d7a335e91aad2836baf2a647d66c
5bafba82265fc0cd3b3b802850bfc982a7427239f87c364c881591c96c717cb5
6175df01c768533f5c4e3e3d1a49d0770a2dcca9c45ae2d150d95f4ff666b54f
466bd07ba5662c8787479a2ead7d90419ef31c4b61f36b9384968b9ea1822a10
c93d2d7d45d531ead9824e70925767ef0e8adc23f88f05baafb7e6435772db58
ccd68adcb8b8997dfabaf2d2b960d56a9d03e4ffaf8aff1cb6e0a83f948cf850
38da70826e367c9808b135717c5ea31e4e69ef03eef307e958773053508badf3
10bba880bc376e0d2f6578ba5aa30e2145730f9e5f49c95dc15d36f3cf9369b7
773a219eb43af7fb4a56992e11871dbd3463acae0f7a82f12efa25ac84248d13
422d646c28b4fda4b6291e868342895495b714cba76384d01b769db14ead4c79
760d1df67b31599e46ae064d183e44f511acfa7c2d5f6241fe96bf6e484e7dab
f699ae77419a80e03b5113a3f60b5e06a98b304db624c4d331e227555e51b563
3569516ca7fb25dbd76547a0d73e55e201838126e90b4f6aad641e29a87c67eb
4e2212b5c17f53f53984fa67051a2aa386147eba453d51f6bb6798b833c7ad1e
16c80a82f353e2d4ba539b68fd79b969045f03d5f51c0fe3cd0e63c909d69d31
02915d95d547fb99913510cb80de6f84bace739e40fc1aa4a5e5689e7a1ca4d2
efacb905cbe59645ce57ea6ac46d32add5f48278aefd411bf4f53116ca0fb0e0
d064d129468e2dc39658850f39237561aa02ed7c87715c4f3b37ec475904cf04
c468c0cee1e4f984dddcd81bfa0108b6f8fa97f6666ece1df8f912c52109feb9
f4b43bbc941d68dd3f835a9fc776c5b3e4e0e7442836bcd845d31c87acf64be7
96393c19d6a8749a8772ad2cec560aa8715db7f4efc3edc6e33f1d5dc525af3c
30bc6d1024943ded3b3b666c9bebaea8059b6cd06d9af6ec346e113407f439db
b7b94daf07f73603e9cfe3ffc082ce9a63db71e9815c2cf1105d25653bb1d32f
6e46c37c824f13c573fea62962c995f2e614c4751db1102e842033c176014378
d1ad5fd5f6ed1ca6556b80636b019b020755c7b3586c683fcddeb9688ed0017e
2006d79276316eea72f9c19d6169a67fd71eefd25b8e1007d9a72f1a1154b1e5
48d29a8519bd574b03306f6c5e47cc9918d204a4a492acf654ce3acafa59498c
21b45cf293c8b1587d29f4a641b448ff3f817d6c99fa114841858208a0e2ae0a
53cddb13890406ae74bed519674f611b58188fb94b6485d624a60680f6d0b786
c5b1a84308686f8d0009dc18291bb28be36ea5863180cfcf5fa5206e0daa7df5
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). |
| Rule name: | Chrome_stealer_bin_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | Chrome in files like avemaria |
| Rule name: | crime_win32_hvnc_banker_gen |
|---|---|
| Author: | @VK_Intel |
| Description: | Detects malware banker hidden VNC |
| Reference: | https://twitter.com/VK_Intel/status/1247058432223477760 |
| Rule name: | crime_win32_hvnc_zloader1_hvnc_generic |
|---|---|
| Author: | @VK_Intel |
| Description: | Detects Zloader hidden VNC |
| Reference: | https://twitter.com/malwrhunterteam/status/1240664014121828352 |
| Rule name: | HiddenVNC |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies HiddenVNC, which can start remote sessions. |
| Rule name: | IPPort_combo_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | IP and port combo |
| Rule name: | Keylog_bin_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | Contains Keylog |
| Rule name: | MAL_QuasarRAT_May19_1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects QuasarRAT malware |
| Reference: | https://blog.ensilo.com/uncovering-new-activity-by-apt10 |
| Rule name: | MSILStealer |
|---|---|
| Author: | https://github.com/hwvs |
| Description: | Detects strings from C#/VB Stealers and QuasarRat |
| Reference: | https://github.com/quasar/QuasarRAT |
| Rule name: | Quasar |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect QuasarRAT in memory |
| Rule name: | Quasar_RAT_1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Quasar RAT |
| Reference: | https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf |
| Rule name: | Quasar_RAT_2 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Quasar RAT |
| Reference: | https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf |
| Rule name: | Select_from_enumeration |
|---|---|
| Author: | James_inthe_box |
| Description: | IP and port combo |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.