QuasarRAT - Daily Threat Report

Friday, April 24, 2026

Daily Summary

QuasarRAT sample collection registered 7 new samples today, a significant 75% increase above the 7-day average of 4. This marks the highest daily count in the current reporting window and signals a potential escalation in distribution campaigns.

New Samples Detected

The sample distribution shows a clear preference for executable files, with 3 .exe samples accounting for 43% of submissions. PowerShell scripts (2 samples) and VBS scripts (1 sample) indicate continued reliance on living-off-the-land techniques to execute payloads. A single .bin file suggests possible encrypted or obfuscated loader activity. File naming patterns remain generic, with no obvious campaign-specific naming conventions observed.

Distribution Methods

The mixed file type profile points to multi-vector delivery. PowerShell and VBS scripts are frequently delivered via phishing attachments or embedded in email bodies, while .exe samples may arrive through direct download links, dropped by initial access brokers, or bundled with cracked software. The .bin file could indicate a staged payload delivered after initial compromise via script-based droppers.

Detection Rate

Average heuristic detection remains moderate across major AV engines, with signature-based detection struggling against the script-based samples. The .ps1 and .vbs variants commonly employ base64 encoding and AMSI bypass techniques that evade static analysis. Emotet-style obfuscation in the VBS sample suggests cross-family technique borrowing that may require behavioral rules to detect reliably.

C2 Infrastructure

No new C2 servers were identified today. The active infrastructure appears stable, with no geographic shift observed. C2 communication patterns remain consistent with HTTP-based callbacks using standard port 80 and 443 channels.

7-Day Trend

Activity has ramped up sharply from the week’s lower volumes (2-3 samples daily) to today’s 7-sample surge. This spike may represent a coordinated campaign push rather than organic fluctuation.

Security Analysis

A notable observation is the continued absence of new C2 infrastructure despite the sample volume increase. This suggests threat actors are recycling existing operational servers, possibly to maintain operational security overhead. The mix of file types - particularly the rare .bin inclusion - may indicate testing of new encrypted loader variants before wider deployment. Defensive teams should implement behavioral detection rules targeting PowerShell and WMI process spawning from Office applications and script hosts, as this remains the primary initial access vector for script-based QuasarRAT variants.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)

More QuasarRAT Reports

Recent Malware Reports