MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 edc7c9cc2e1eb04dcb1bc16be29f32861aded3acea16c144952fdd8971552d1e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 19 File information Comments

SHA256 hash: edc7c9cc2e1eb04dcb1bc16be29f32861aded3acea16c144952fdd8971552d1e
SHA3-384 hash: bd3a21f97ff051550dbbaea5e3cc41fbda8a1f317f1ceb1006460fc29e88ff848cf19bbb5c1e7d9e10380e33c6fdbed5
SHA1 hash: 0008dd52742e04aa0279a023f2488d9dc44fbd1b
MD5 hash: d0483c13cb55a9d7912567c9e9ac414c
humanhash: twelve-princess-seven-wolfram
File name:Proof of Payment.exe
Download: download sample
Signature QuasarRAT
File size:1'572'635 bytes
First seen:2023-06-21 07:27:37 UTC
Last seen:2023-06-21 07:37:09 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 00be6e6c4f9e287672c8301b72bdabf3 (116 x RedLineStealer, 70 x AsyncRAT, 55 x AgentTesla)
ssdeep 24576:ANA3R5drXPG/Sy9idNo+Zdx3zOAVK0gz8DiottFUxJtCJlAKMUxlri7ZgQ4vSsJE:55AO9OAk0FiottaHtCjAKM97ZCKAOA7E
Threatray 576 similar samples on MalwareBazaar
TLSH T13A750202FE92427DC57ECAF10979B7C0ED7D78242E295ACA3799B20CC23E0519D7DA52
TrID 89.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.5% (.EXE) Win64 Executable (generic) (10523/12/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 00e8d0d0e0e8d400 (5 x AgentTesla, 1 x NanoCore, 1 x njrat)
Reporter lowmal3
Tags:exe QuasarRAT

Intelligence


File Origin
# of uploads :
3
# of downloads :
327
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
Proof of Payment.exe
Verdict:
Malicious activity
Analysis date:
2023-06-21 07:30:47 UTC
Tags:
evasion quasar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% directory
Running batch commands
Creating a process from a recently created file
Creating a file
Using the Windows Management Instrumentation requests
DNS request
Sending an HTTP GET request
Launching a process
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
90%
Tags:
greyware lolbin overlay packed quasar setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
100 / 100
Signature
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Generic Downloader
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 891871 Sample: Proof_of_Payment.exe Startdate: 21/06/2023 Architecture: WINDOWS Score: 100 34 Found malware configuration 2->34 36 Malicious sample detected (through community Yara rule) 2->36 38 Multi AV Scanner detection for submitted file 2->38 40 4 other signatures 2->40 10 Proof_of_Payment.exe 9 2->10         started        process3 file4 28 C:\Users\user\AppData\Local\...\ingbt.sfx.exe, PE32 10->28 dropped 13 cmd.exe 1 10->13         started        process5 process6 15 ingbt.sfx.exe 8 13->15         started        19 conhost.exe 13->19         started        file7 30 C:\Users\user\AppData\Local\Temp\ingbt.exe, PE32 15->30 dropped 32 Multi AV Scanner detection for dropped file 15->32 21 ingbt.exe 1 15->21         started        signatures8 process9 signatures10 42 Antivirus detection for dropped file 21->42 44 Multi AV Scanner detection for dropped file 21->44 46 Machine Learning detection for dropped file 21->46 24 ingbt.exe 21->24         started        process11 process12 26 WerFault.exe 24->26         started       
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2023-06-20 23:55:50 UTC
File Type:
PE (Exe)
Extracted files:
23
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar botnet:tbop spyware trojan
Behaviour
Creates scheduled task(s)
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Quasar RAT
Quasar payload
Malware Config
C2 Extraction:
2.59.255.71:64594
kolptyubeatcam.sytes.net:64594
Unpacked files
SH256 hash:
8ffc5307406c345027cfe5ff363fbd89ceae3abbd1cb6519938178916ecf8193
MD5 hash:
061f70934c97d56fbaa91a73d529a8c5
SHA1 hash:
b9d955cd175949380509438e5a075dc73b2c3310
SH256 hash:
ac04dc80f07434ca7c2b9b0662309ca640a8608996e8c8f649338c93176a75a3
MD5 hash:
42dd4b50e1f332d6c9b30bfb7994856a
SHA1 hash:
7a5bf12e679414a420c38d291be7f6cddb33b588
SH256 hash:
c42c63d8983a5eab31a2c825dcddd94b8672419d5ac6cc813dc8f2d9b100125e
MD5 hash:
9874fb9cde46e78fcb12f137e53d90de
SHA1 hash:
5025c43c0fbc393d2472be858980671324802fce
Detections:
QuasarRAT
SH256 hash:
1cdd96e8cbab016e55d88c9059d4612b2b44a274bc83f409e3db8e739bb8f1f6
MD5 hash:
6d43222844c3bd62de2fbff6a28ec082
SHA1 hash:
1d6a0f2c4acc188e8f6df436ff81e200e502805b
SH256 hash:
edc7c9cc2e1eb04dcb1bc16be29f32861aded3acea16c144952fdd8971552d1e
MD5 hash:
d0483c13cb55a9d7912567c9e9ac414c
SHA1 hash:
0008dd52742e04aa0279a023f2488d9dc44fbd1b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CN_disclosed_20180208_KeyLogger_1
Author:Florian Roth (Nextron Systems)
Description:Detects malware from disclosed CN malware set
Reference:https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details
Rule name:CN_disclosed_20180208_KeyLogger_1_RID3227
Author:Florian Roth
Description:Detects malware from disclosed CN malware set
Reference:https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_GENInfoStealer
Author:ditekSHen
Description:Detects executables containing common artifcats observed in infostealers
Rule name:malware_Quasar_strings
Author:JPCERT/CC Incident Response Group
Description:detect QuasarRAT in memory
Rule name:MALWARE_Win_QuasarRAT
Author:ditekSHen
Description:QuasarRAT payload
Rule name:MAL_QuasarRAT_May19_1
Author:Florian Roth (Nextron Systems)
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:MAL_QuasarRAT_May19_1_RID2E1E
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:pe_imphash
Rule name:Quasar_RAT_1
Author:@SOCRadar
Description:Detects Quasar RAT
Rule name:Quasar_RAT_1_RID2B54
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:Quasar_RAT_2
Description:Detects Quasar RAT
Rule name:Quasar_RAT_2_RID2B55
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Vermin_Keylogger_Jan18_1
Author:Florian Roth (Nextron Systems)
Description:Detects Vermin Keylogger
Reference:https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/
Rule name:Windows_Trojan_Quasarrat_e52df647
Author:Elastic Security
Rule name:xRAT_1
Author:Florian Roth (Nextron Systems)
Description:Detects Patchwork malware
Reference:https://goo.gl/Pg3P4W
Rule name:xRAT_1_RID2900
Author:Florian Roth
Description:Detects Patchwork malware
Reference:https://goo.gl/Pg3P4W

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

QuasarRAT

Executable exe edc7c9cc2e1eb04dcb1bc16be29f32861aded3acea16c144952fdd8971552d1e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments