- Table of contents
The author
I love to get stuck in and let the creative juices flow. My strengths lie in idea generation, development and execution. Over 5 years experience in B2B cybersecurity. I reign supreme when my imagination and creativity can run wild.
Table of contents
Diving Into Quasar RAT: TTPs, IoCs and more
Introduction
Quasar, crafted in the C# programming language, is a publicly accessible and open-source Remote Access Trojan (RAT) designed for Microsoft Windows operating systems (OSs). This creation comes courtesy of the GitHub user MaxXor and resides as a publicly hosted repository on GitHub. While its utility extends to legitimate applications like enabling remote assistance from an organization’s helpdesk technician, Quasar is being exploited by APT actors for cybercrime and cyber espionage endeavors.
The core architecture of Quasar RAT comprises two essential components: the server-side and the client-side. The server-side boasts a user-friendly graphical interface that empowers attackers to manage connections with the client-side applications, enabling them to orchestrate and manipulate infected machines remotely. The client-side, often unknowingly downloaded by victims through deceptive means like email attachments, acts as the conduit for granting malicious operators control over the victim’s system.
Quasar RAT’s arsenal of capabilities includes remote file manipulation, alteration of system registries, monitoring and recording victim actions, and establishing covert remote desktop connections. This trojan’s silent execution capability ensures it can run discreetly in the background, remaining active for extended periods to facilitate data theft and provide attackers with persistent control over compromised systems.
Delivery Methods
Quasar is propagated by cybercriminals through spam campaigns and various download pathways that raise concerns. Cybercriminals utilizing these spam campaigns send out emails containing attachments, banking on the recipients’ likelihood of opening them. Should these malicious attachments be accessed, they result in the unwelcome installation of harmful software.
Quasar RAT has been used by a wide range of threat actors, from individual cybercriminals to state-sponsored APT groups like APT10 (also known as Stone Panda, Cicada) and the Gaza Cybergang. It has been observed in campaigns targeting various sectors, including governments, defense, energy, finance, healthcare, and manufacturing, across different geographical regions.
Examples of commonly employed files to facilitate malware proliferation encompass Microsoft Office documents, PDF files, executable files, JavaScript files, and archived formats like ZIP and RAR, which can potentially harbor malicious content. Additionally, questionable download routes or third-party downloaders come into play as vehicles for malware dissemination.
Typically, these sources consist of unofficial downloaders or installers, unsanctioned websites, platforms offering free file hosting, pages offering freeware downloads, Peer-to-Peer networks such as torrent clients and eMule, along with akin platforms. Opening files procured from these sources frequently culminates in the installation of malevolent software.
These uploaded files are carefully camouflaged to present themselves as harmless and credible. Deceptive techniques employed to lure individuals into installing rogue programs encompass counterfeit update tools, trojans, and unofficial software “activation” tools. These bogus update tools assume the guise of legitimate software updaters, while their actual function is to initiate the download and installation of other malicious programs.
Impact
With Quasar RAT, cybercriminals can access and control Task Manager, Registry Editor, download/upload and execute files, log keystrokes, steal passwords, and gain unauthorized access to personal and important accounts. The risks of Quasar RAT infection include unauthorized access to personal and financial information, loss of data, compromise of important accounts, installation of additional malware, and potential damage to the computer system.
A Sample of IoCs
Type | Created at | Updated at | Value |
---|---|---|---|
SHA-256 | 2025-06-17 | 2025-06-17 | cf7a24c9f2f9d85cc1ba4a11890087b82e38f39c8d194e808e9e6d82a188d3f0 |
SHA-256 | 2025-06-17 | 2025-06-17 | 14b573b7e3ff8ad4e1489a5c039532f16f9eff34ead1d299f97fb0badf0affdc |
Domain | 2025-06-17 | 2025-06-17 | big-expressed.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | iliketacos12341-30048.portmap.io |
Domain | 2025-06-17 | 2025-06-17 | if-definition.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | svhost.mine.nu |
Domain | 2025-06-17 | 2025-06-17 | includes-whose.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | imhimlmai-61691.portmap.io |
Domain | 2025-06-17 | 2025-06-17 | rule-covers.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | ckfejrnet.airdns.org |
Domain | 2025-06-17 | 2025-06-17 | associated-bk.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | jamierose-42682.portmap.io |
Domain | 2025-06-17 | 2025-06-17 | ilikefemboys1234-38334.portmap.io |
Domain | 2025-06-17 | 2025-06-17 | dugites-44896.portmap.io |
Domain | 2025-06-17 | 2025-06-17 | enans-33358.portmap.io |
Domain | 2025-06-17 | 2025-06-17 | specter699-31351.portmap.io |
Domain | 2025-06-17 | 2025-06-17 | repair-oscar.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | his-varied.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | accommodation-specialist.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | lines-flags.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | gta5rppppp-61894.portmap.io |
Domain | 2025-06-17 | 2025-06-17 | r.aartzz.pp.ua |
Domain | 2025-06-17 | 2025-06-17 | fully-expensive.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | engineering-ebay.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | githubrdp-22467.portmap.io |
Domain | 2025-06-17 | 2025-06-17 | pulsar-tcp.at.remote.it |
Domain | 2025-06-17 | 2025-06-17 | harunet.airdns.org |
Domain | 2025-06-17 | 2025-06-17 | mexico-shopper.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | b-proper.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | darkarmteam-41484.portmap.io |
Domain | 2025-06-17 | 2025-06-17 | brostoplookingformyc2-21003.portmap.io |
Domain | 2025-06-17 | 2025-06-17 | africa-manufacturing.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | dewaw64518-23532.portmap.io |
Domain | 2025-06-17 | 2025-06-17 | pacific-astronomy.gl.at.ply.gg |
Domain | 2025-06-17 | 2025-06-17 | long-importantly.gl.at.ply.gg |
Domain | 2025-06-16 | 2025-06-16 | sergei123323-34602.portmap.io |
Domain | 2025-06-16 | 2025-06-16 | xikhudog2.duckdns.org |
Domain | 2025-06-16 | 2025-06-16 | anonam39-41248.portmap.io |
Domain | 2025-06-16 | 2025-06-16 | gazaru-21459.portmap.io |
Domain | 2025-06-16 | 2025-06-16 | alexkasa-53195.portmap.io |
Domain | 2025-06-16 | 2025-06-16 | stores-replace.gl.at.ply.gg |
Domain | 2025-06-15 | 2025-06-15 | joshuasmith-59211.portmap.io |
SHA-256 | 2025-06-14 | 2025-06-14 | 3c5058f664ce2c787ec8e8c6236839a66e5fc433679d719c3e609bdd71daa2ab |
SHA-256 | 2025-06-14 | 2025-06-14 | 021da5ec7464baf51058c8821a0d164a43732466fcd4083990caac6fc8859952 |
SHA-256 | 2025-06-14 | 2025-06-14 | ec623337e17c8a9b0cd636c905b9b1e474040516e7bd4cb6fdc45310ecf2181c |
SHA-256 | 2025-06-14 | 2025-06-14 | c2b78e277970e1607c23f03bf7facfb77a1dd50798acc078fd942abe59baca6f |
SHA-256 | 2025-06-13 | 2025-06-13 | e72b5521b5e66dde10a7241109d8a9340b89a3ddad317aabe32cadad09326e50 |
SHA-256 | 2025-06-13 | 2025-06-13 | c4d3e5b4cb795c3db3524a4a91668bb32af8c68bb7bf35715e5538edeffcf2e2 |
SHA-256 | 2025-06-13 | 2025-06-13 | 62e2c7d860a0e3e0975c5b9da5193f9ab3ca6c56ef4eea46d17cc87ac4598b90 |
Domain | 2025-06-13 | 2025-06-13 | request-poems.gl.at.ply.gg |
TTPs
Tactic | Technique |
---|---|
Reconnaissance | T1590 – Gather Victim Network Information |
Lateral Movement | T0859 – Valid Accounts |
Initial Access | T0817 – Drive-by Compromise |
Initial Access | T0862 – Supply Chain Compromise |
Reconnaissance | T1591 – Gather Victim Org Information |
Initial Access | T1566 – Phishing |
Initial Access | T0819 – Exploit Public-Facing Application |
Initial Access | T1474 – Supply Chain Compromise |
Persistence | T1078 – Valid Accounts |
Defense Evasion | T1078 – Valid Accounts |
Initial Access | T1078 – Valid Accounts |
Privilege Escalation | T1078 – Valid Accounts |