Try VMRay Platform
Malicious
Classifications

Backdoor Injector Spyware Keylogger

Threat Names

AZORult QuasarRAT xRAT Mal/Generic-S +2

Remarks (2/3)

(0x0200003A): A task was rescheduled ahead of time to reveal dormant functionality.

(0x0200000E): The overall sleep time of all monitored processes was truncated from "4 minutes, 39 seconds" to "3 seconds" to reveal dormant functionality.

VMRay Threat Identifiers (37 rules, 79 matches)

ScoreCategoryOperationCountClassification
5/5
Extracted ConfigurationQuasarRAT configuration was extracted1Backdoor
5/5
YARAMalicious content matched by YARA rules11Spyware, Backdoor
5/5
DiscoveryCombination of other detections shows configuration discovery1-
5/5
Data CollectionCombination of other detections shows multiple input capture behaviors1Spyware
4/5
Defense EvasionObscures a file's origin3-
4/5
InjectionWrites into the memory of another process1Injector
4/5
InjectionModifies control flow of another process1-
4/5
ReputationMalicious file detected via reputation3-
4/5
ReputationMalicious host or URL detected via reputation4-
3/5
Input CaptureMonitors keyboard input1Keylogger

Malware Configurations

Screenshots

Monitored Processes

Process GraphProcess Graph Legend

MITRE ATT&CK™ Matrix - Windows

ActiveAll
Version: 2019-04-25 20:53:07.719000
Initial Access
Execution
Scheduled Task
Windows Management Instrumentation
Persistence
Hooking
Hidden Files and Directories
Scheduled Task
Registry Run Keys / Startup Folder
Privilege Escalation
Hooking
Process Injection
Scheduled Task
Defense Evasion
NTFS File Attributes
Process Injection
Hidden Files and Directories
Hidden Window
Modify Registry
Software Packing
Credential Access
Input Capture
Hooking
Discovery
System Information Discovery
System Network Configuration Discovery
Process Discovery
Query Registry
Lateral Movement
Collection
Automated Collection
Input Capture
Command and Control
Uncommonly Used Port
Exfiltration
Impact

Sample Information

ID#10523762
MD5
7b8655174b6523bb1262fc6464a1cc3e
SHA1
98d6097da81a5d2c912f97497f81b25e3bba74bb
SHA256
8f4c47976f851049b82a25404b72c892147d9aa7d3b62024c686ad24c763f029
SSDeep
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYB:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yn
ImpHash
afcdf79be1557326c854b6e20cb900a7
File NameAdobe Download Manager.exe
File Size2062.98 KB
Sample TypeWindows Exe (x86-32)

Analysis Information

Creation Time2024-05-28 17:05 (UTC+)
Analysis Duration00:04:00
Termination ReasonTimeout
Number of Monitored Processes87
Execution Successful
Reputation Enabled
Built-in AV Enabled
Number of AV Matches0
YARA Enabled
Number of YARA Matches26
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image