MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f36b01d5314702442aa02f34a90d1d2c6d5b444ae0f57c9ff01f0d979bd28a66. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 8 File information Comments

SHA256 hash: f36b01d5314702442aa02f34a90d1d2c6d5b444ae0f57c9ff01f0d979bd28a66
SHA3-384 hash: 86c5136e54d69ec8a7666e09c731b0dc44e9d68fd47bd2629908e64291e7e6e056a897a701bdbaf0d3774c8966e987ab
SHA1 hash: b331fa45c9f5f813bd1003442a0717bedd5cd15f
MD5 hash: bfffc710c0e969cb0a84343fadc309a0
humanhash: london-alpha-solar-spaghetti
File name:Fondo403850398139736380061.vbs
Download: download sample
Signature QuasarRAT
File size:894'850 bytes
First seen:2022-12-26 05:00:36 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 96:TwIh/+R4avIIe8yFL2r33MLchA9JwKPSJ9kXnTs541qLi1KNqg/clXXT5OcJIwh+:Tp835hA9HL3Tg4R18kYwhu1S+
Threatray 5'895 similar samples on MalwareBazaar
TLSH T1EA15471336DAD0C867E336874BDBF5B807FEB7D5152E66AC54CD0A098BD2A048A417E3
TrID 66.6% (.TXT) Text - UTF-16 (LE) encoded (2000/1)
33.3% (.MP3) MP3 audio (1000/1)
Reporter abuse_ch
Tags:QuasarRAT RAT vbs


Avatar
abuse_ch
QuasarRAT C2:
142.44.252.26:4782

Intelligence


File Origin
# of uploads :
1
# of downloads :
174
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Drops VBS files to the startup folder
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Obfuscated command line found
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: Drops script at startup location
Snort IDS alert for network traffic
Suspicious powershell command line found
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
VBScript performs obfuscated calls to suspicious functions
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Yara detected Quasar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 773742 Sample: Fondo403850398139736380061.vbs Startdate: 26/12/2022 Architecture: WINDOWS Score: 100 104 Snort IDS alert for network traffic 2->104 106 Multi AV Scanner detection for domain / URL 2->106 108 Malicious sample detected (through community Yara rule) 2->108 110 6 other signatures 2->110 11 wscript.exe 1 2->11         started        14 wscript.exe 1 2->14         started        17 wscript.exe 1 2->17         started        process3 dnsIp4 126 VBScript performs obfuscated calls to suspicious functions 11->126 128 Suspicious powershell command line found 11->128 130 Wscript starts Powershell (via cmd or directly) 11->130 19 powershell.exe 7 11->19         started        102 192.168.2.1 unknown unknown 14->102 22 powershell.exe 14->22         started        24 powershell.exe 7 17->24         started        signatures5 process6 signatures7 112 Suspicious powershell command line found 19->112 114 Obfuscated command line found 19->114 116 Drops VBS files to the startup folder 19->116 26 powershell.exe 14 17 19->26         started        31 conhost.exe 19->31         started        33 powershell.exe 15 22->33         started        35 conhost.exe 22->35         started        37 powershell.exe 24->37         started        39 conhost.exe 24->39         started        process8 dnsIp9 100 91.213.50.74, 49696, 49704, 49709 ASBAXETNRU unknown 26->100 88 C:\Users\user\AppData\Roaming\...\Run.vbs, Unicode 26->88 dropped 136 Writes to foreign memory regions 26->136 138 Injects a PE file into a foreign processes 26->138 41 RegAsm.exe 15 2 26->41         started        45 cmd.exe 1 26->45         started        47 RegAsm.exe 33->47         started        49 cmd.exe 33->49         started        51 RegAsm.exe 33->51         started        53 RegAsm.exe 37->53         started        55 cmd.exe 37->55         started        file10 signatures11 process12 dnsIp13 90 142.44.252.26, 4782, 49700, 49706 OVHFR Canada 41->90 92 api4.ipify.org 64.185.227.156, 443, 49703, 49708 WEBNXUS United States 41->92 98 2 other IPs or domains 41->98 118 May check the online IP address of the machine 41->118 120 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 41->120 122 Uses schtasks.exe or at.exe to add and modify task schedules 45->122 57 schtasks.exe 1 45->57         started        94 api.ipify.org 47->94 124 Hides that the sample has been downloaded from the Internet (zone.identifier) 47->124 59 cmd.exe 47->59         started        62 schtasks.exe 49->62         started        96 api.ipify.org 53->96 64 cmd.exe 53->64         started        66 schtasks.exe 55->66         started        signatures14 process15 signatures16 132 Uses ping.exe to sleep 59->132 134 Uses ping.exe to check the status of other devices and networks 59->134 68 RegAsm.exe 59->68         started        70 conhost.exe 59->70         started        72 chcp.com 59->72         started        74 PING.EXE 59->74         started        76 RegAsm.exe 64->76         started        78 conhost.exe 64->78         started        80 chcp.com 64->80         started        82 PING.EXE 64->82         started        process17 process18 84 conhost.exe 68->84         started        86 conhost.exe 76->86         started       
Threat name:
Script.Downloader.Heuristic
Status:
Malicious
First seen:
2022-12-26 05:01:10 UTC
File Type:
Text (VBS)
AV detection:
6 of 40 (15.00%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar botnet:proxym spyware trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Blocklisted process makes network request
Quasar RAT
Quasar payload
Malware Config
C2 Extraction:
142.44.252.26:4782
Dropper Extraction:
http://91.213.50.74/GREEN/ZXC/ZAS/dllf3.txt
Malware family:
QuasarRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_GENInfoStealer
Author:ditekSHen
Description:Detects executables containing common artifcats observed in infostealers
Rule name:MALWARE_Win_QuasarStealer
Author:ditekshen
Description:Detects Quasar infostealer
Rule name:MAL_QuasarRAT_May19_1
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:MAL_QuasarRAT_May19_1_RID2E1E
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Vermin_Keylogger_Jan18_1
Author:Florian Roth
Description:Detects Vermin Keylogger
Reference:https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments