user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Trojan:MSIL/QuasarRat.TO!MTB
Trojan:MSIL/QuasarRat.TO!MTB - Windows Defender threat signature analysis

Trojan:MSIL/QuasarRat.TO!MTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Trojan:MSIL/QuasarRat.TO!MTB
Classification:
Type:Trojan
Platform:MSIL
Family:QuasarRat
Detection Type:Concrete
Known malware family with identified signatures
Variant:TO
Specific signature variant within the malware family
Suffix:!MTB
Detected via machine learning and behavioral analysis
Detection Method:Behavioral
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan - Appears legitimate but performs malicious actions for .NET (Microsoft Intermediate Language) platform, family QuasarRat

Summary:

This is a detection for QuasarRat, a well-known open-source Remote Access Trojan (RAT). It grants an attacker full remote control over the infected system, allowing for data theft, surveillance, and command execution. The !MTB suffix indicates this was identified through machine learning-based behavioral analysis rather than a static signature.

Severity:
Medium
VDM Static Detection:
No detailed analysis available from definition files.
Known malware which is associated with this threat:
Filename: Sp0f.exe
6475a67a8117925b5ddf98899466ed0a818040eed7ffa6bf4795059116b9f5d7
15/11/2025
Remediation Steps:
Immediately isolate the affected host from the network. Run a full antivirus scan to remove the threat. Investigate for persistence mechanisms, reset all user passwords on the machine, and consider reimaging the device as the extent of compromise is likely unknown.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 15/11/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$