MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fa22249ff51657484072c83e53e154212f12d7659a44feb49e16982dd4ebf552. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuasarRAT


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: fa22249ff51657484072c83e53e154212f12d7659a44feb49e16982dd4ebf552
SHA3-384 hash: 2d319c2e71ba36b8c1c27060ccc81e7d33dab78ed497363df32ca601cd89a8632035e5e2205c7463389cec6c49a7bf0a
SHA1 hash: 150e895fbf2085222dd76c2ef6595a4b04be1761
MD5 hash: f4cc54763cbf0494510742590b799d5c
humanhash: november-alaska-bulldog-orange
File name:42x9ht_aporia.exe
Download: download sample
Signature QuasarRAT
File size:87'252'480 bytes
First seen:2025-10-26 22:16:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 00097805748014a0566196bbe0e1e104 (1 x QuasarRAT)
ssdeep 393216:CQ4X85BIoQkg6NJXjN/yNDyAV5qWEpgC7WsZtR2RKrkcN9TZLQcgMek3XReVz/bB:Ch1UMqWKTe1HDb2HbUpnf8RRtgPdBsc
TLSH T16C188D4253AA09D5EAFBEA3485E65D03D773FC062B3881CF72481B261F336E09976B51
TrID 49.9% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win32 Executable (generic) (4504/4/1)
9.6% (.EXE) OS/2 Executable (generic) (2029/13)
9.5% (.EXE) Generic Win/DOS Executable (2002/3)
9.4% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
dhash icon f89efcf8f971f2e0 (10 x NodeLoader, 9 x FixStealer, 6 x Amadey)
Reporter 01Xyris
Tags:exe QuasarRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
3'094
Origin country :
CA CA
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
aporia.exe
Verdict:
Malicious activity
Analysis date:
2025-10-26 22:18:46 UTC
Tags:
pastebin auto-reg crypto-regex api-base64 wmi-base64

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
90.2%
Tags:
obfuscate xtreme shell
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a process with a hidden window
Running batch commands
Creating a file
Creating a window
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Blocking a possibility to launch for the Windows Task Manager (taskmgr)
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm anti-vm crypto expand fingerprint lolbin microsoft_visual_cc
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-10-26T19:33:00Z UTC
Last seen:
2025-10-27T19:00:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan.Win32.Generic HEUR:Trojan.MSIL.Shelpak.gen HEUR:Trojan.MSIL.Chepl.a Backdoor.MSIL.Agent.sb Trojan-PSW.Win64.Stealer.sb Trojan-PSW.MSIL.Agent.sb Trojan.Win32.Vimditator.sb Trojan.MSIL.Quasar.fjf Trojan.MSIL.Quasar.fio Trojan.MSIL.Inject.sb Backdoor.SharPi.HTTP.C&C Trojan.MSIL.Quasar.a Trojan.MSIL.Agent.sb HEUR:Trojan-Banker.MSIL.ClipBanker.gen
Gathering data
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2025-10-25 16:20:07 UTC
File Type:
PE+ (Exe)
Extracted files:
13
AV detection:
7 of 38 (18.42%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:quasar execution persistence spyware trojan
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Adds Run key to start application
Command and Scripting Interpreter: PowerShell
Legitimate hosting services abused for malware hosting/C2
Badlisted process makes network request
Quasar RAT
Quasar family
Quasar payload
Malware family:
QuasarRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments