QuasarRAT - Daily Threat Report

Thursday, May 7, 2026

Daily Summary

QuasarRAT sample volume held steady at 10 new samples today, matching the 7-day average exactly (0% change). No surge or drop was observed, indicating consistent but not escalating activity. The trend remains neutral.

New Samples Detected

All 10 new samples were identified, with a significant dominance of executable files (.exe: 9) and a single batch script (.bat: 1). No shifts in packaging or naming patterns were noted; the .exe samples appear to be standard compiled .NET binaries typical of QuasarRAT. The lone .bat file suggests occasional use of script-based loaders, possibly for initial execution.

Distribution Methods

Given the file type composition, distribution is likely through spear-phishing email attachments (the .exe files) or malicious download links. The .bat file could be used as a downloader to fetch and execute the RAT payload from a remote server. No new campaign signatures or social engineering themes were identified in today’s data.

Detection Rate

With 10 new IOCs submitted, detection rates for current variants remain moderate. Standard sandbox-executed QuasarRAT samples often have high detection on major AV engines, but the inclusion of a .bat file may indicate an attempt to bypass static analysis by delaying payload download. New variants may achieve partial evasion if packed or obfuscated.

C2 Infrastructure

No new C2 servers were observed today, and none from the previous 7-day period appeared active. The lack of new C2 infrastructure suggests actors may be reusing existing servers or that observed samples did not call out during analysis. No geographic patterns are available.

7-Day Trend

Activity over the past week has been stable, with daily counts ranging from 8 to 12 samples and today’s count exactly at the average. No ramping up or cooling down is evident; the campaign appears to be maintaining a steady operational pace.

Security Analysis

A notable observation is the persistence of batch script usage alongside .exe files. While QuasarRAT is typically delivered as a standalone executable, the .bat file indicates a shift toward multi-stage execution that can evade initial file scanning and process monitoring. Defenders should prioritize monitoring for script interpreters (cmd.exe, powershell.exe) spawning unexpected network connections or file downloads, as this pattern suggests a loader architecture. Recommendation: Enable command-line logging and restrict script execution via AppLocker or WDAC to prevent .bat-based downloaders from executing.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)

More QuasarRAT Reports

Recent Malware Reports