Quasar RAT

12
Global rank
16
Month rank
17
Week rank
5582
IOCs

Quasar is a very popular RAT in the world thanks to its code being available in open-source. This malware can be used to control the victim’s computer remotely.

Trojan
Type
Unknown
Origin
1 January, 2015
First seen
3 June, 2023
Last seen

How to analyze Quasar RAT with ANY.RUN

Trojan
Type
Unknown
Origin
1 January, 2015
First seen
3 June, 2023
Last seen

IOCs

IP addresses
140.82.121.4
3.142.167.4
209.25.141.181
66.254.114.41
209.25.141.212
208.95.112.1
3.64.4.198
157.240.9.35
209.25.141.194
209.25.141.223
18.136.148.247
18.139.9.214
18.141.129.246
18.192.31.165
104.26.6.150
18.158.249.75
3.125.223.134
3.124.142.205
107.150.23.167
79.134.225.22
Hashes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vcctggqm3t.dattolocal.net
api.jublo.net
eltem.iptime.org
elx01.knas.systems
njxyro.ddns.net
192-168-100-240.otmn.direct.quickconnect.to
192-168-100-240.otmn.direct.quickconnect.to
joemclean.duckdns.org
microsoftfixer.duckdns.org
fevertoxs.duckdns.org
adenere.duckdns.org
fevertox.duckdns.org
8.tcp.ngrok.io
move-liability.at.ply.gg
tips-longer.at.ply.gg
consider-brochure.at.ply.gg
browser-geology.at.ply.gg
american-command.at.ply.gg
bit-dedicated.at.ply.gg
its-tension.at.ply.gg
Last Seen at

Recent blog posts

recentPost
How to Create a Task in ANY.RUN:a Step-by-Ste...
watchers 308
comments 0
recentPost
ChatGPT for SOC and Malware Analysis professi...
watchers 5384
comments 0
recentPost
Deobfuscating the Latest GuLoader: Automating...
watchers 3237
comments 3

What is Quasar RAT?

Quasar is a remote access trojan is used by attackers to take remote control of infected machines. It is written using the .NET programming language and is available to a wide public as an open-source project for Microsoft Windows operating systems, making it a popular RAT featured in many attacks.

General description of Quasar RAT

Quasar RAT was first discovered in 2015 by security researchers, who, at the time, speculated that an in-house development team wrote this RAT after performing the analysis of a sample. However, Quasar is an evolution of an older malware called xRAT, and some of its samples can carry out as many as 16 malicious actions.

Over the course of its lifetime, the malware has been updated several times, improving its overall functionality. The last version of the malware, which the original author developed, is v. 1.3.0.0. It was released in 2016. Since then, several third parties have adapted the RAT and issued their own version, both minor and major, with the last major version being v. 2.0.0.1.

The RAT we are reviewing today consists of two main components – the server-side component and the Quasar client-side component. The server is equipped with a graphical user interface, and it is used for managing connections with the client-side programs. The Quasar client-server architecture is also utilized to build malware samples which are eventually delivered to potential victims. Malware users can select attributes and customize the executable to fit the attacker's needs. The Quasar client and server run on different OSs including all Windows versions.

The functionality of the resulting malware includes remote file management on the infected machine, registry alterations, recording the actions of the victim, establishing remote desktop connections, and more. All of the data including requests are sent to the host server with the user-agent strings.

It should be noted that Quasar's execution can unfold completely silently. Thus, once the victim downloads and launches the Quasar client, usually delivered in a document via email, it can stay active for a long period of time, stealing data and giving the hacker control over the infected PC. The malware does generate a process that can be discovered using the Windows Task Manager or a similar application, but active user actions are required to discover Quasar trojan's presence on a machine.

As far as creators of this malware are concerned, the group of people or a person behind the original version of this malware managed to remain anonymous. As a result, the little-known information that we do have does not go beyond the name of the GitHub page author, which states “quasar.”

As evident from the description on the “official” Quasar GitHub page, this malware is presented as a legitimate remote administration program, which is clearly misleading. In fact, Quasar was featured in an attack aimed at the US government early in 2017. Later the same year, another wave of attacks using this malware occurred, targeting the private sector.

Quasar RAT malware analysis

The execution process of this malware can be viewed in a video recorded in the ANY.RUN malware hunting service, allowing to perform analysis of how the contamination process unfolds.

process graph of the quasar stealer execution Figure 1: Displays the lifecycle of Quasar in a visual form, as shown on the graph generated by ANY.RUN.

text report of quasar analysis Figure 2: Shows a customizable text report generated by the ANY.RUN malware hunting service.

Quasar RAT execution process

Based on the analysis, Quasar execution is pretty straightforward but can vary in minor details from sample to sample. The RAT's user-agent strings fake various processes such as a browser running on Windows. In the given example, Quasar was dropped from a Microsoft Office file. Then, the dropped file changed the registry value to run with every operating system start, checked for external IP, and copied itself at another location. After all these steps, the malware started the main malicious activity - collecting information about the operating system and waiting for commands from the C2 server. Quasar allows malware users to collect host system data.

How to avoid infection by Quasar?

Quasar trojan writes itself into scheduled tasks and uses registry keys to achieve persistence, allowing the malware the run every time a machine is started. The persistence method is chosen based on user privileges. If the user has admin rights, the malware uses schtasks to create a scheduled task that launches after a user logs on with the highest run level. If admin rights are lacking, then the scheduled task can only go as far as adding a registry value configured in the client builder and added to the current path as the startup program. The best way to avoid infection is for cybersecurity specialists gt to know various user-agent strings that exist in their network, and identify suspicious user-agent strings.

Distribution of Quasar RAT

Like most other RATs, for example Crimson RAT or Orcus RAT, Quasar is distributed in email spam campaigns that carry the malware’s loader. The loader is embedded in a malicious file attachment which usually carries a name designed to trick the user into thinking that they are receiving some sort of a document. Sometimes these files will have a double extension such as docx.exe. Again, this is done to trick the victim into thinking that the attached file is harmless. Of course, once opened, such files start a command prompt rather than Microsoft Office.

How to detect Quasar RAT using ANY.RUN?

ANY.RUN uses Suricata IDS rule sets, so if malware tries to communicate with C&C servers, it will be detected. To look at what threats were detected, just click on the "Threats" section of the "Network" tab.

quasar network threats Figure 3: Quasar network threats

Conclusion

Quasar trojan is a powerful open-source malware equipped with a robust persistence mechanism and a complete feature set of malicious capabilities. Being available to anybody with programming knowledge, Quasar became a widely used RAT which was even featured in an attack targeted at the American government.

However, unlike other more advanced Trojans, Quasar RAT does not have extremely sophisticated anti-analysis features, which makes setting up robust cyber-defense an easier task, especially when using malware hunting services like ANY.RUN to simplify and streamline the research process.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
Ave Maria screenshot
Ave Maria
avemaria stealer trojan rat
Ave Maria malware is a Remote Access Trojan that is also called WARZONE RAT. Hackers use it to control the PCs of their victims remotely and steal information from infected PCs. For example, they can remotely activate the camera to take pictures of a victim and send them to a control server.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy