QuasarRAT - Distribution Methods
File types, delivery vectors, and hosting infrastructure used to distribute QuasarRAT.
Last updated: 2026-04-18
Understanding how QuasarRAT reaches victims is critical for prevention. This page breaks down the file types used in distribution, the hosting infrastructure serving malicious payloads, and URLs tracked by URLhaus. Data is updated daily.
What Distribution Data Tells You
Shifts in file type distribution often signal changes in delivery tactics. For example, a move from .exe to .msi files may indicate operators adapting to Windows SmartScreen or email gateway filtering. A surge in .js or .vbs files suggests script-based delivery through phishing emails. Monitoring these patterns helps you tune your email security gateway rules and endpoint protection policies to block the current delivery method before it reaches end users.
Hosting Infrastructure
The hosting data below shows which domains and servers are actively distributing QuasarRAT payloads. Add these to your DNS blocklists, web proxy deny rules, and firewall policies. Hosting infrastructure tends to rotate frequently as takedowns occur, so check this page regularly. All URL data is sourced from URLhaus. For hash-based indicators, see the IOC page. For sample details, see QuasarRAT samples.
File Types (49 samples)
Malicious Distribution URLs (57)
http://147.45.79.74:5001/client.exe http://132.243.173.111:3000/aIg.exe http://132.243.173.111:3000/aIg.exe.88 http://132.243.173.111:3000/aIg_173_55.zip http://132.243.173.111:3000/start_qsr.ps1 http://132.243.173.111:3000/aIg_173_55_2.zip https://raw.githubusercontent.com/demarcusnofatherington420-a11y/ScriptInstaller/refs/heads/main/encrypted.hta https://raw.githubusercontent.com/demarcusnofatherington420-a11y/ScriptInstaller/refs/heads/main/WindowsLogonService.bat https://raw.githubusercontent.com/demarcusnofatherington420-a11y/ScriptInstaller/refs/heads/main/DetectionRateTesting.hta https://raw.githubusercontent.com/demarcusnofatherington420-a11y/RickOwens/refs/heads/main/encrypted.hta https://especially-acrobat-rouge-dominant.trycloudflare.com/go.bat https://epgoldsecurity.com/ShadoClient.exe https://epgoldsecurity.com/ShadowClient.exe http://192.177.26.196/files/8525074840/yxPIfd2.msi http://192.177.26.196/files/8525074840/mdOjagm.bat http://158.94.208.168/files/8042875554/QxknRPs.exe http://196.251.107.24/q8348.exe http://62.60.226.97:5553/saloreap.exe http://158.94.208.7/files/8012574236/eIXHiiV.exe http://158.94.208.7/files/8012574236/4aMmUA4.exe http://158.94.208.7/files/1781548144/okR3iq0.exe http://158.94.208.7/files/8635093259/TUzr0QP.exe http://196.251.107.24/v4343.exe http://158.94.208.7/files/8548282130/O43GJVa.exe http://158.94.211.222/files/7942715918/1SbgglW.exe http://158.94.211.222/files/7942715918/otRD45B.exe http://158.94.211.222/files/8548282130/trP9KGI.exe http://158.94.211.222/files/8548282130/trP9KGI.bat https://raw.githubusercontent.com/evilgrou-tech/drive/refs/heads/main/launcher.bat https://raw.githubusercontent.com/evilgrou-tech/drive/refs/heads/main/PZ-Reversals.ps1 https://raw.githubusercontent.com/evilgrou-tech/drive/refs/heads/main/forex.ps1 https://raw.githubusercontent.com/Administrator-hub/Data.Uploads/refs/heads/main/doiidieraupload.txt http://130.12.180.43/files/7044575709/yQcmXNb.exe http://91.232.103.250/cs2.exe http://bmh-global.myfirewall.org/WORDS.exe http://94.154.32.195/killxd.bat https://94.154.32.195/killxd.bat https://roverbot.info/killxd.bat http://roverbot.info/killxd.bat http://91.232.103.250/quasar.exe http://91.232.103.250/color.exe http://130.12.180.43/files/6260748665/SJlwfe0.exe http://130.12.180.43/files/1773787694/RMnsgES.exe http://floneimf.ydns.eu/webcontents/drsgtsrhydtesrtshtigushdfhsdufhuhdsfrgsthfxh/ibKUVSEfbgrnsrkgtsdzthsftgzhthsthsfg/contents.exe http://130.12.180.43/files/6075866260/44NoKFh.exe http://vereasw.ydns.eu/CH1.exe http://friendly.ydns.eu/CH1.exe http://130.12.180.43/files/8546428528/EE7OeTn.exe http://130.12.180.43/files/8546428528/IyVls5r.exe http://130.12.180.43/files/7972786482/xwn3Zn2.exe http://130.12.180.43/files/7972786482/Cia2O5x.exe http://130.12.180.43/files/7538357236/XxpGuvc.bat http://130.12.180.43/files/6719008056/LR0D6Rm.bat http://130.12.180.43/files/8468434805/fKDnWbX.exe http://ilovehosting1.com/1.bat http://130.12.180.43/files/7972786482/6TsgDw4.exe http://62.60.226.97:5553/formy.exe
Source: URLhaus (abuse.ch). Updated: 2026-04-18
Hosting Infrastructure
| Host | URLs |
|---|---|
| 130.12.180.43 | 12 |
| raw.githubusercontent.com | 8 |
| 132.243.173.111 | 5 |
| 158.94.208.7 | 5 |
| 158.94.211.222 | 4 |
| 91.232.103.250 | 3 |
| epgoldsecurity.com | 2 |
| 192.177.26.196 | 2 |
| 196.251.107.24 | 2 |
| 62.60.226.97 | 2 |
| 94.154.32.195 | 2 |
| roverbot.info | 2 |
| 147.45.79.74 | 1 |
| especially-acrobat-rouge-dominant.trycloudflare.com | 1 |
| 158.94.208.168 | 1 |
| bmh-global.myfirewall.org | 1 |
| floneimf.ydns.eu | 1 |
| vereasw.ydns.eu | 1 |
| friendly.ydns.eu | 1 |
| ilovehosting1.com | 1 |