General
-
Target
65e4930b06035_VCheatsV2.9.zip
-
Size
10.7MB
-
Sample
240807-yt8h7awhqf
-
MD5
3a9c874139009e63cf7877f33dfab82c
-
SHA1
f74a9ae9fb1fc97ff63b3cba6e530ab48ba1ad7b
-
SHA256
5a23ff9ffd139fe24b32526e517092952a97e3195910146ee79177cbce17f681
-
SHA512
265b2a22da641c86e744c3b7bba89b044c856b1c2fc06180e97184a566fec48d0f35d35b9d96094114f3727f5c0b439ed672b1d235994b742435da10bae455c7
-
SSDEEP
196608:RqjpnWnmjca50uNoYxJPWQ2apISnc/W/8Ij3tSNIJcOJblIrzjZmRP3XJRSDt:RqjlYaC4o2Pw2gWkIj33cMxCzjZm9LEt
Static task
static1
Behavioral task
behavioral1
Sample
65e4930b06035_VCheatsV2.9.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
VCheats V2.8.bat
Resource
win10v2004-20240802-en
Malware Config
Extracted
quasar
-
reconnect_delay
3000
Targets
-
-
Target
65e4930b06035_VCheatsV2.9.zip
-
Size
10.7MB
-
MD5
3a9c874139009e63cf7877f33dfab82c
-
SHA1
f74a9ae9fb1fc97ff63b3cba6e530ab48ba1ad7b
-
SHA256
5a23ff9ffd139fe24b32526e517092952a97e3195910146ee79177cbce17f681
-
SHA512
265b2a22da641c86e744c3b7bba89b044c856b1c2fc06180e97184a566fec48d0f35d35b9d96094114f3727f5c0b439ed672b1d235994b742435da10bae455c7
-
SSDEEP
196608:RqjpnWnmjca50uNoYxJPWQ2apISnc/W/8Ij3tSNIJcOJblIrzjZmRP3XJRSDt:RqjlYaC4o2Pw2gWkIj33cMxCzjZm9LEt
Score1/10 -
-
-
Target
VCheats V2.8.bat
-
Size
15.4MB
-
MD5
a2728a545a1c36f6cab1ba8d907f999f
-
SHA1
d5a3c703250ce7d4bce77545b8b58a672ce80719
-
SHA256
805aea906bde7f654de4d457c939a2836c406f8ecd29dfe9cd57688f0fa0d96c
-
SHA512
c736efa0a4f4b60eeff83a6c504c378192cf3061a172ee5d820380ad9646cf9d6f761d42bf0d37e161c7fd397d2e37b09ebc685e958fe2fa4b859febbce8d0a1
-
SSDEEP
49152:eciqF22DGlCLCoVwZvXwU/l4E7elQceShuAsAdDOxtp0lM8WMjYEASLWwNZm8CKK:Q
Score10/10-
Quasar payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Drops file in System32 directory
-