QuasarRAT - Daily Threat Report

Wednesday, May 6, 2026

Daily Summary

QuasarRAT sample volume held nearly steady at 10, falling just 9% below the 7-day average of 11. Activity remains in a stable, low-to-moderate range with no significant surge or drop observed today.

New Samples Detected

Of the 10 new samples, 9 are packed executable (.exe) files, and 1 is a batch (.bat) script. The batch script likely serves as a downloader or persistence mechanism. Packaging patterns remain consistent with recent weeks - most executables use standard UPX compression, and no new packers or crypters were identified.

Distribution Methods

Based on file types, delivery continues via phishing emails with weaponized attachments or links. The .bat file suggests initial access may involve script-based downloads, possibly through HTML smuggling or archive attachments. Known campaign patterns show QuasarRAT often arrives disguised as invoices, shipping notices, or IT support documents.

Detection Rate

Current QuasarRAT variants maintain moderate detection rates on major AV platforms, typically between 70-80% on VirusTotal. The batch script variant may see slightly lower detection (60-70%) due to its non-executable nature. Defenders should rely on behavioral detection - network traffic analysis for C2 patterns is more reliable than signature-based detection alone.

C2 Infrastructure

No new C2 servers were recorded today, and no sudden geographic shifts are apparent. Activity is stable - existing C2 infrastructure remains operational, typically hosted on VPS providers in Eastern Europe and Russia. Operators rarely change IPs unless forced by takedowns.

7-Day Trend

Volume over the past week has been consistently near the 11-sample average, with only minor day-to-day fluctuations. This suggests QuasarRAT is in a steady-state operational phase rather than an active campaign ramp-up.

Security Analysis

A notable observation from today’s batch of samples is the inclusion of a .bat script - a slight tactical shift from the pure executable delivery seen in recent weeks. This may indicate operators are testing script-based initial access to bypass email scanning filters that block .exe attachments. The batch script likely downloads and executes the main payload in memory, reducing forensic artifacts. Actionable recommendation: Enable behavioral blocking for script execution from untrusted sources, and monitor for child processes spawned by cmd.exe or wscript.exe that initiate outbound network connections.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)

More QuasarRAT Reports

Recent Malware Reports