Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed

Posted on December 8, 2025December 8, 2025 By CWS

QuasarRAT, initially surfacing in 2014 underneath the alias xRAT, started its lifecycle as a reputable distant administration software for Home windows environments.

During the last decade, nevertheless, its open-source nature and accessibility have facilitated its transformation right into a potent instrument for cybercriminals.

The malware is constructed on the .NET Framework utilizing C#, making it extremely adaptable for various malicious campaigns starting from knowledge theft to community intrusions.

Menace actors leverage QuasarRAT for a broad spectrum of intrusive actions, together with unauthorized surveillance and cyber espionage operations.

Its capabilities embody extracting system data, managing recordsdata, logging keystrokes, and executing arbitrary instructions.

These options permit attackers to take care of persistent management over compromised techniques, making it a most popular alternative for each impartial hackers and state-aligned teams in search of a light-weight, customizable payload to breach networks.

Sekoia safety analysts recognized that QuasarRAT’s reputation stems from its ease of modification and the supply of its supply code on platforms like GitHub.

This accessibility permits attackers to recompile the malware with bespoke functionalities, tailoring it to particular targets.

The malware’s affect is additional amplified by its potential to evade primary detection mechanisms by steady code adaptation, making certain it stays a persistent menace.

The core hazard lies in its versatility. Whether or not used for monetary theft or gathering intelligence, QuasarRAT integrates seamlessly into varied assault chains.

PowerShell Reflection capabilities (Supply – Sekoia)

Its design helps the addition of recent options, making certain it stays a related menace within the panorama.

Unwrapping Encrypted Configuration and Obfuscation

Current QuasarRAT samples implement superior obfuscation to hide configuration knowledge. Whereas commonplace builds would possibly depart settings in plain textual content, malicious variants continuously make use of heavy obfuscation.

These variants make the most of AES-256 encryption in CBC mode to safe vital knowledge like Command-and-Management (C2) servers. The decryption secret’s usually derived utilizing PBKDF2 with a hardcoded salt worth discovered within the Aes256 class.

To bypass these defenses, analysts use a mixture of Python and .NET libraries comparable to dnlib to examine the Intermediate Language (IL) code.

Decompiled code of obfuscated QuasarRAT (Supply – Sekoia)

The extraction course of entails finding the static constructor (.cctor) the place the AES secret’s initialized.

By analyzing the IL directions—particularly in search of opcodes like ldstr and stsfld—researchers can get well the cryptographic materials. This enables retrieval of the AES key and salt with out execution.

Encrypted strings (Supply – Sekoia)

For closely obfuscated samples, the decryption routine is recognized by tallying technique calls inside the Settings class. As soon as the decryption operate and the salt are remoted, the configuration strings may be decrypted, revealing the attacker’s infrastructure. This successfully counters makes an attempt to cover indicators of compromise.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Configuration, Core, Encrypted, Exposed, Functionalities, Obfuscation, QuasarRAT, Techniques

Post navigation

Previous Post: CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary
Next Post: New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide

Related Posts

Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach Cyber Security News
CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks Cyber Security News
Top 10 Best End-to-End Threat Intelligence Compaines in 2025 Cyber Security News
Attack Techniques of Tycoon 2FA Phishing Kit Targeting Microsoft 365 and Gmail Accounts Detailed Cyber Security News
Google to Flag Apps on Play Store that Use Excessive Amount of battery Cyber Security News
ClickFix Attack Uses Steganography to Hide Malicious Code in Fake Windows Security Update Screen Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks
  • Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware
  • New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide
  • QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed
  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks
  • Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware
  • New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide
  • QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed
  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark