Edit tour
Windows
Analysis Report
2C8CDA2CCC942B4EDA8E1EE37A8F68C557FEE80E14244.exe
Overview
General Information
Detection
Quasar
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Yara detected Quasar RAT
Snort IDS alert for network traffic
Machine Learning detection for sample
Yara detected Generic Downloader
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Classification
- System is w10x64
- 2C8CDA2CCC942B4EDA8E1EE37A8F68C557FEE80E14244.exe (PID: 7640 cmdline:
C:\Users\u ser\Deskto p\2C8CDA2C CC942B4EDA 8E1EE37A8F 68C557FEE8 0E14244.ex e MD5: 66E51A7BDC0E564E87B21187D385E73C)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Quasar RAT, QuasarRAT | Quasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult. |
{"Version": "1.4.1", "Host:Port": "212.23.222.42:7332;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "8e6c6c66-0494-4473-a1b5-36eb0ef84dde", "StartupKey": "Quasar Client Startup", "Tag": "7332", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
MAL_QuasarRAT_May19_1 | Detects QuasarRAT malware | Florian Roth |
| |
INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen |
| |
MALWARE_Win_QuasarStealer | Detects Quasar infostealer | ditekshen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
MAL_QuasarRAT_May19_1 | Detects QuasarRAT malware | Florian Roth |
| |
INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen |
| |
MALWARE_Win_QuasarStealer | Detects Quasar infostealer | ditekshen |
|
⊘No Sigma rule has matched
Timestamp: | 212.23.222.42192.168.2.107332497032035595 11/08/23-10:41:11.525851 |
SID: | 2035595 |
Source Port: | 7332 |
Destination Port: | 49703 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Malware Configuration Extractor: |