|
gptkbp:instanceOf
|
gptkb:Remote_Access_Trojan
|
|
gptkbp:alsoKnownAs
|
gptkb:QuasarRAT
xRAT
|
|
gptkbp:author
|
gptkb:MaxXor
|
|
gptkbp:category
|
gptkb:remote_administration_tool
gptkb:malware
|
|
gptkbp:detects
|
gptkb:security
|
|
gptkbp:encryption
|
TLS
|
|
gptkbp:exfiltrationMethod
|
network communication
|
|
gptkbp:features
|
file transfer
process management
command execution
keylogging
remote desktop control
password stealing
|
|
gptkbp:firstReleased
|
2014
|
|
gptkbp:license
|
gptkb:GNU_General_Public_License_v3.0
|
|
gptkbp:maliciousUse
|
surveillance
data theft
system control
|
|
gptkbp:notableBattle
|
used in APT campaigns
|
|
gptkbp:openSource
|
true
|
|
gptkbp:operatingSystem
|
gptkb:Windows
|
|
gptkbp:persistenceMechanism
|
registry modification
scheduled tasks
|
|
gptkbp:programmingLanguage
|
gptkb:C#
|
|
gptkbp:repository
|
https://github.com/quasar/Quasar
|
|
gptkbp:supportsProtocol
|
gptkb:TCP
|
|
gptkbp:target
|
Windows computers
|
|
gptkbp:usedBy
|
threat actors
|
|
gptkbp:usedFor
|
gptkb:cybercrime
|
|
gptkbp:bfsParent
|
gptkb:Blind_Eagle
gptkb:NANOCORE_RAT
|
|
gptkbp:bfsLayer
|
7
|
|
https://www.w3.org/2000/01/rdf-schema#label
|
Quasar RAT
|