MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f9fe40ca4d842619322a11c4013a2210132d4c7afa0c4ae88be17f13ee6d1b16. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
QuasarRAT
Vendor detections: 16
| SHA256 hash: | f9fe40ca4d842619322a11c4013a2210132d4c7afa0c4ae88be17f13ee6d1b16 |
|---|---|
| SHA3-384 hash: | de50b837792580960f54b0e046bfa73555e43a9fdf9052493c76b981ae86a086a082a78041d0e2744f0ef91283cdcfac |
| SHA1 hash: | 8c914dd231daff31092bf5de3db22eb9c07c622d |
| MD5 hash: | d5def75143e3302847f9e6f64a1cad4e |
| humanhash: | lithium-shade-helium-mexico |
| File name: | doc_Zapytanie - Oferta KH 09281.com |
| Download: | download sample |
| Signature | QuasarRAT |
| File size: | 3'863'552 bytes |
| First seen: | 2024-09-10 08:04:10 UTC |
| Last seen: | 2024-09-10 08:22:12 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'599 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 49152:cfMJOv6Id+/vm1z5O2W925nAkOvFNhRg6Zuzzt1TjmFPJBld+3Y81SUAbaYgrL8z:ckoSYGu15jWqQvbUN125JKrAbabB0 |
| Threatray | 816 similar samples on MalwareBazaar |
| TLSH | T1860623131BD8C959C1BAD2B466AAC1300B76DE0BF8A3D376DEC1E9D33E15321AD0574A |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | Anonymous |
| Tags: | exe QuasarRAT |
Intelligence
File Origin
# of uploads :
2
# of downloads :
443
Origin country :
USVendor Threat Intelligence
Malware family:
asyncrat
ID:
1
File name:
doc_Zapytanie - Oferta KH 09281.com
Verdict:
Malicious activity
Analysis date:
2024-09-10 08:07:24 UTC
Tags:
rat asyncrat remote quasar evasion
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Execution Generic Network Static Stealth Msil
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
masquerade packed
Verdict:
Malicious
Labled as:
Win/malicious_confidence_100%
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Agent Tesla
Verdict:
Malicious
Result
Threat name:
Quasar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected Quasar RAT
Behaviour
Behavior Graph:
Score:
99%
Verdict:
Malware
File Type:
PE
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 806 additional samples on MalwareBazaar
Result
Malware family:
quasar
Score:
10/10
Tags:
family:quasar botnet:long leg discovery spyware trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
Quasar RAT
Quasar payload
Malware Config
C2 Extraction:
twart.myfirewall.org:9792
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
c5cb97fbe4243df1a99a9c82f44ad555f283fad9f4b15b791faebe5048c8fc99
MD5 hash:
3e8b57c2be9df63483a368b71ccb938b
SHA1 hash:
deb26a1b7f616c8d392ae55dd279140b034a4060
Detections:
QuasarRAT
malware_windows_xrat_quasarrat
win_quasarrat_j2
cn_utf8_windows_terminal
MAL_QuasarRAT_May19_1
Parent samples :
5a3a32262eb6d6ca3126a6055e32cd1c0a680637b3f238d0fbb0e36bc9b8081d
3255bba29d1d4de38cb9d72636251ed19516ee5c090512f4332f38b837cf13f0
d80b06effbd34b981b32276034abe3c118ac51a53ace4a253bb52c90cb18f13d
a388e34ff2cb46b718c443618a4597468bfc2236195c06bccbfa71dbf5d47479
c40f2fe5758bf18b22131930c426b2551b191d4ec50ea072a232895d006eace1
c5cb97fbe4243df1a99a9c82f44ad555f283fad9f4b15b791faebe5048c8fc99
6230049aca6cf64db37be7c35946481041629c4f40311f5a39ba45303bd992e7
f9fe40ca4d842619322a11c4013a2210132d4c7afa0c4ae88be17f13ee6d1b16
fd3b039df3e9a565b6964276f98c61d4555f3f3dabf1a9d76604f9ff4d4b3fb7
b4a61a178dfda52928802e1189f3bf1bef1c03aecf6b6fc99d2a3713f3d5e202
3255bba29d1d4de38cb9d72636251ed19516ee5c090512f4332f38b837cf13f0
d80b06effbd34b981b32276034abe3c118ac51a53ace4a253bb52c90cb18f13d
a388e34ff2cb46b718c443618a4597468bfc2236195c06bccbfa71dbf5d47479
c40f2fe5758bf18b22131930c426b2551b191d4ec50ea072a232895d006eace1
c5cb97fbe4243df1a99a9c82f44ad555f283fad9f4b15b791faebe5048c8fc99
6230049aca6cf64db37be7c35946481041629c4f40311f5a39ba45303bd992e7
f9fe40ca4d842619322a11c4013a2210132d4c7afa0c4ae88be17f13ee6d1b16
fd3b039df3e9a565b6964276f98c61d4555f3f3dabf1a9d76604f9ff4d4b3fb7
b4a61a178dfda52928802e1189f3bf1bef1c03aecf6b6fc99d2a3713f3d5e202
SH256 hash:
977c171b803f331530312ef8545d3da7b904df52ab91eb429fe2ae528b65073b
MD5 hash:
150090ab2f3211a3509baf8858aaff25
SHA1 hash:
d54e54dc2710f5ff6178d427a6896194ce587df0
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
c59a72e874640d2d2c5669edc14fdeb82a72cbacde61679907d2926b8ed79d08
MD5 hash:
b37fc99b846edbde0d0f36bee1760849
SHA1 hash:
0016396b048dcbda5b87742c32678f706db6362c
SH256 hash:
f9fe40ca4d842619322a11c4013a2210132d4c7afa0c4ae88be17f13ee6d1b16
MD5 hash:
d5def75143e3302847f9e6f64a1cad4e
SHA1 hash:
8c914dd231daff31092bf5de3db22eb9c07c622d
Malware family:
QuasarRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.