General
-
Target
CHEAT.rar
-
Size
36.3MB
-
Sample
250209-dvjagavphn
-
MD5
203ba38accab7ff9b181c88176d7e17f
-
SHA1
33bd9fc89e77faed86bda399d018f9413f6eba73
-
SHA256
eab5f974ec202f9576335f50646b1a7e6725557b1227b8f96ecc889c15498905
-
SHA512
2cc04354147ef18f22c753303f4417744d349d41a1eb6ea28ef8ffad3831aa3e6317b698c24b3c1dc0ef60ed4e38564d21be4afc9a485ea22ec75dbe739f76a7
-
SSDEEP
786432:cQ1zPwv64YV/iSmT3kJtj88ZEP87mD+cmodF2fppwcPX/fzi82lb7O:hLB4YMhT0JtiKmiodiHvPWJlb7O
Behavioral task
behavioral1
Sample
CHEAT.rar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
CHEAT.rar
Resource
win10v2004-20250207-en
Malware Config
Extracted
quasar
1.4.1
Office04
10.0.1.100:4782
ed337c2a-f410-44a6-a75b-740207b7d8db
-
encryption_key
6D00964D3D31D45131A3ECADA49AED6AAB6AAED0
-
install_name
CHEAT.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
CHEAT.rar
-
Size
36.3MB
-
MD5
203ba38accab7ff9b181c88176d7e17f
-
SHA1
33bd9fc89e77faed86bda399d018f9413f6eba73
-
SHA256
eab5f974ec202f9576335f50646b1a7e6725557b1227b8f96ecc889c15498905
-
SHA512
2cc04354147ef18f22c753303f4417744d349d41a1eb6ea28ef8ffad3831aa3e6317b698c24b3c1dc0ef60ed4e38564d21be4afc9a485ea22ec75dbe739f76a7
-
SSDEEP
786432:cQ1zPwv64YV/iSmT3kJtj88ZEP87mD+cmodF2fppwcPX/fzi82lb7O:hLB4YMhT0JtiKmiodiHvPWJlb7O
-
Quasar family
-
Quasar payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Creates new service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1