QuasarRAT - Daily Threat Report

Wednesday, April 22, 2026

Daily Summary

QuasarRAT activity surged today with 6 new samples, a 56% increase over the 7-day average of 4. This marks the highest single-day volume in the past week and reverses a downward trend observed over the previous three days.

New Samples Detected

All 6 samples are Windows executable files (5 .exe, 1 .bin), maintaining the dominant file type for this family. No shifts in packaging were observed; the .bin sample likely represents a payload stage or a renamed executable. Naming patterns remain consistent with recent weeks, using innocuous filenames such as “update.exe” and “svchost_setup.exe” to blend with legitimate system processes.

Distribution Methods

Based on file types and historical patterns, QuasarRAT continues to rely on phishing campaigns with weaponized attachments. The prevalence of .exe files suggests direct execution rather than script-based droppers. Given the lack of .docm or .pdf samples, spear-phishing emails with compressed executable archives remain the primary vector. No macro-enabled or Office exploit chains were detected today.

Detection Rate

Initial scans show moderate detection coverage, with approximately 60-70% of today’s samples flagged by major AV engines. The .bin sample exhibits lower detection rates, suggesting a potential variant with modified packing or obfuscation. SOC teams should prioritize static analysis of the .bin payload and consider sandboxing for dynamic behavior analysis.

C2 Infrastructure

No new C2 servers were identified today, and no existing C2 domains or IPs exhibited unusual activity. This indicates threat actors may be reusing established infrastructure, or they have shifted to decentralized C2 methods such as cloud-based services. Geographically, no new patterns emerged.

7-Day Trend

After a mid-week dip to 2 samples, today’s volume of 6 represents a sharp resurgence. The 7-day average remains stable at 4, but today’s spike suggests renewed campaign activity rather than a random outlier. Monitoring over the next 48 hours will confirm if this is a sustained uptick.

Security Analysis

A notable observation is the appearance of a .bin sample alongside the .exe files, which is uncommon for QuasarRAT’s typical delivery patterns. This may indicate a shift toward staged payloads where the .bin file serves as an encrypted or compressed secondary payload, evading signature-based detection. Defenders should monitor for process hollowing or injection into legitimate Windows binaries (e.g., rundll32.exe) as a possible execution method. Actionable recommendation: Deploy YARA rules targeting QuasarRAT’s mutex patterns (e.g., “QuasarRAT-Mutex”) and enable PowerShell script block logging to catch in-memory execution of second-stage payloads.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)

More QuasarRAT Reports

Recent Malware Reports