General
-
Target
ogfncheats.bat
-
Size
12.5MB
-
Sample
231223-1jet8shcdm
-
MD5
f5887c10643d58145e6322c8344b0169
-
SHA1
52738891d47f153d1d833b87cd9ec33f8ab2065d
-
SHA256
284fd3f018a4477fae7d37a1e79300f1ccfd4fd1f8b2247b25db36d1e9487e7a
-
SHA512
b6ac2b6827484cd4a2959c0274fb9d57dee56699d8c2120528c477277ae5117b89450cfa16fa33bde71250404a588fa14adf872f120e364b3f14b28304ae1264
-
SSDEEP
49152:DZeMEzX//hQjnzQOMfpqqm1AoOhr3CHiOVeE6g6O6phedXk/Baug+pR4BUkWWTyz:4
Static task
static1
Behavioral task
behavioral1
Sample
ogfncheats.bat
Resource
win7-20231215-en
Malware Config
Extracted
quasar
1.0.0.0
v2.2.3 | SeroXen
european-robert.gl.at.ply.gg:43917
816d330a-0199-4676-8308-586f21e65988
-
encryption_key
03D4B9A32AA2E0B8E7FE7E0957A921C9A3869870
-
install_name
.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
2000
Targets
-
-
Target
ogfncheats.bat
-
Size
12.5MB
-
MD5
f5887c10643d58145e6322c8344b0169
-
SHA1
52738891d47f153d1d833b87cd9ec33f8ab2065d
-
SHA256
284fd3f018a4477fae7d37a1e79300f1ccfd4fd1f8b2247b25db36d1e9487e7a
-
SHA512
b6ac2b6827484cd4a2959c0274fb9d57dee56699d8c2120528c477277ae5117b89450cfa16fa33bde71250404a588fa14adf872f120e364b3f14b28304ae1264
-
SSDEEP
49152:DZeMEzX//hQjnzQOMfpqqm1AoOhr3CHiOVeE6g6O6phedXk/Baug+pR4BUkWWTyz:4
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-