QuasarRAT - Daily Threat Report

Saturday, April 4, 2026

Daily Summary

QuasarRAT activity declined significantly today, with only 5 new samples identified. This represents a 46% decrease from the 7-day average of 9 samples. The drop in volume coincides with no new C2 infrastructure being registered.

New Samples Detected

The three .exe files continue the family’s typical pattern of posing as legitimate software installers. The single .msi sample is notable, as this Windows Installer package format is less common for QuasarRAT and may indicate an attempt to exploit different software deployment channels. The .bin file is likely an obfuscated payload intended for side-loading.

Distribution Methods

Current distribution remains consistent with historical phishing and malvertising campaigns. The .exe and .msi file types suggest primary delivery via malicious email attachments or compromised downloads. The presence of a .bin file could point to a multi-stage delivery chain, where it is fetched by a simpler initial dropper.

Detection Rate

Vendor detection for these new samples is moderately high, with approximately 75-80% of engines flagging them as malicious. The .msi and .bin variants show a slightly lower initial detection rate, suggesting minor obfuscation changes are being tested to evade signature-based detection.

C2 Infrastructure

No new C2 servers were identified today. This lack of infrastructure expansion, paired with the low sample volume, suggests the current activity may be from a smaller, isolated campaign or a testing phase rather than a broad distribution push.

7-Day Trend

Activity has been volatile but generally cooling down over the past week, with today’s count being the lowest. The week began with a spike near the average before this sharp decline.

Security Analysis

The current low-volume, multi-format delivery (.exe, .msi, .bin) mirrors patterns seen in limited, targeted campaigns rather than mass spam. This could indicate actors are refining payload packaging for specific targets. The use of an .msi package is a minor tactical shift to potentially bypass application allow-listing that only scrutinizes .exe files. A key defensive recommendation is to enhance monitoring for unusual child processes spawned from Windows Installer (msiexec.exe), particularly those making network connections, as this could indicate a malicious .msi execution.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)