QuasarRAT - Daily Threat Report

Sunday, April 19, 2026

Daily Summary

Sample volume for QuasarRAT is below the recent average, with three new samples identified compared to a 7-day average of five, representing a 42% decline. No new command and control infrastructure was registered today.

New Samples Detected

The new samples consist of two .exe files and one .bin file. The .bin file is a notable deviation from the typical executable payloads, potentially indicating a shift toward using intermediary or disguised file formats in initial stages of a campaign.

Distribution Methods

The presence of a .bin file suggests possible delivery through archive attachments or as a secondary payload downloaded by a loader. The .exe files likely rely on social engineering tactics, such as masquerading as legitimate software installers, a consistent pattern for this RAT.

Detection Rate

Current variants show moderate detection rates by major AV engines. The singular .bin sample has a slightly lower detection score than the .exe files, indicating that alterations in file type may provide temporary evasion against static signatures.

C2 Infrastructure

No new C2 servers were identified, suggesting operators may be consolidating operations on existing, resilient infrastructure or employing peer-to-peer fallback mechanisms inherent to QuasarRAT.

7-Day Trend

Activity has cooled this week, moving from a steady average of five samples daily down to today’s lower count. This may indicate a lull between distribution campaigns or a shift in focus by threat actors.

Security Analysis

The introduction of a .bin file type, while a minor change, may be a low-effort test to bypass simple file extension-based blocking rules. This mirrors a trend of using non-standard extensions observed in recent, low-volume campaigns. Defensive teams should ensure application allow-listing policies are based on file hash or digital signature, not just extension, and monitor for unusual processes spawning from files with obscure extensions.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)

More QuasarRAT Reports

Recent Malware Reports