Cheat sheets

Quasar bot download [Latest]

Share this with people that should know this:

Download the latest version of the Quasar bot. This C# remote administration tool is known for it’s powerful functions and stability.

Quasar is a powerful open-source RAT equipped with a robust persistence mechanism and a complete feature set of capabilities. Being available to anybody with programming knowledge,

Quasar screen

About Quasar

Quasar is a fast and light-weight remote administration tool coded in C#. The usage ranges from user support through day-to-day administrative work to employee monitoring. Providing high stability and an easy-to-use user interface, Quasar is the perfect remote administration solution for you.

Quasar RAT was first discovered in 2015 by security researchers, who, at the time, speculated that this RAT was written by an in-house development team after performing the analysis of a sample. Quasar is an evolution of an older malware called xRAT and some of its samples can carry out as much as 16 malicious actions.

Over the course of its lifetime, the malware has been updated several times, improving its overall functionality. The last version of the malware which was developed by the original author is v. 1.3.0.0. It was released in 2016. Since that time several third parties have adapted the RAT and issued their own version, both minor and major with the last major version being v. 2.0.0.1.

The RAT

The RAT we are reviewing today consists of two main components – the server-side component and the client-side component. The server is equipped with a graphical user interface and it is used for managing connections with the client-side programs. The server-side component is also utilized to build malware samples which are eventually delivered to potential victims. Malware user has an option to select attributes and customize the executable to fit the needs of the attacker.

The functionality of the resulting malware includes remote file management on the infected machine, registry alterations, recording the actions of the victim, establishing remote desktop connections and more.

It should be noted that Quasar execution can unfold completely silently, thus, once the victim downloads and launches the client, usually delivered in a document via email, it can stay active for a long period of time, stealing data and giving the hacker control over the infected PC. The malware does generate a process that can be discovered using the Windows Task Manager or a similar application, but active user actions are required to discover Quasar trojan presence on a machine.

Creators

As far as creators of this malware are concerned, the group of people or a person behind the original version of this malware managed to remain anonymous. The little known information that we do have does not go beyond the name of the GitHub page author which states simply “quasar”.

As evident from the description on the “official” Quasar GitHub page, this malware is presented as a legitimate remote administration program, which is clearly misleading. In fact, Quasar was featured in an attack aimed at the US government early in 2017. Later the same year another wave of attacks using this malware occurred, this time targeting the private sector.

Functions in Quasar

  1. TCP network stream (IPv4 & IPv6 support)
  2. Fast network serialization (Protocol Buffers)
  3. Compressed (QuickLZ) & Encrypted (TLS) communication
  4. UPnP Support
  5. Task Manager
  6. File Manager
  7. Startup Manager
  8. Remote Desktop
  9. Remote Shell
  10. Remote Execution
  11. System Information
  12. Registry Editor
  13. System Power Commands (Restart, Shutdown, Standby)
  14. Keylogger (Unicode Support)
  15. Reverse Proxy (SOCKS5)
  16. Password Recovery (Common Browsers and FTP Clients)

How is Quasar distributed in malicious campaigns?

Just as most of the other RATs, Quasar is distributed in email spam campaigns that carry the malware’s loader. The loader is embedded in a malicious file attachment which usually carries a name designed to trick the user into thinking that he or she is receiving some sort of a document. Sometimes these files will have a double extension such as docx.exe. This is done to trick the victim into thinking that the attached file is harmless. Of course, once opened, such files start a command prompt rather than Microsoft Office.

Download

https://github.com/quasar/Quasar
Share this with people that should know this: