Overview
overview
10Static
static
10CHEAT.rar
windows10-ltsc 2021-x64
10CHEAT.rar
windows11-21h2-x64
8#524#@7asRFj438!!.exe
windows10-ltsc 2021-x64
10#524#@7asRFj438!!.exe
windows11-21h2-x64
10Config.ini
windows10-ltsc 2021-x64
3Config.ini
windows11-21h2-x64
3HVCI/MbixMY.exe
windows10-ltsc 2021-x64
9HVCI/MbixMY.exe
windows11-21h2-x64
9HVCI/Steam.exe
windows10-ltsc 2021-x64
9HVCI/Steam.exe
windows11-21h2-x64
9General
-
Target
CHEAT.rar
-
Size
36.3MB
-
Sample
250209-w1dlaayncj
-
MD5
203ba38accab7ff9b181c88176d7e17f
-
SHA1
33bd9fc89e77faed86bda399d018f9413f6eba73
-
SHA256
eab5f974ec202f9576335f50646b1a7e6725557b1227b8f96ecc889c15498905
-
SHA512
2cc04354147ef18f22c753303f4417744d349d41a1eb6ea28ef8ffad3831aa3e6317b698c24b3c1dc0ef60ed4e38564d21be4afc9a485ea22ec75dbe739f76a7
-
SSDEEP
786432:cQ1zPwv64YV/iSmT3kJtj88ZEP87mD+cmodF2fppwcPX/fzi82lb7O:hLB4YMhT0JtiKmiodiHvPWJlb7O
Behavioral task
behavioral1
Sample
CHEAT.rar
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral2
Sample
CHEAT.rar
Resource
win11-20250207-en
Behavioral task
behavioral3
Sample
#524#@7asRFj438!!.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral4
Sample
#524#@7asRFj438!!.exe
Resource
win11-20250207-en
Behavioral task
behavioral5
Sample
Config.ini
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral6
Sample
Config.ini
Resource
win11-20250207-en
Behavioral task
behavioral7
Sample
HVCI/MbixMY.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral8
Sample
HVCI/MbixMY.exe
Resource
win11-20250207-en
Behavioral task
behavioral9
Sample
HVCI/Steam.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral10
Sample
HVCI/Steam.exe
Resource
win11-20250207-en
Malware Config
Extracted
quasar
1.4.1
Office04
10.0.1.100:4782
ed337c2a-f410-44a6-a75b-740207b7d8db
-
encryption_key
6D00964D3D31D45131A3ECADA49AED6AAB6AAED0
-
install_name
CHEAT.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
CHEAT.rar
-
Size
36.3MB
-
MD5
203ba38accab7ff9b181c88176d7e17f
-
SHA1
33bd9fc89e77faed86bda399d018f9413f6eba73
-
SHA256
eab5f974ec202f9576335f50646b1a7e6725557b1227b8f96ecc889c15498905
-
SHA512
2cc04354147ef18f22c753303f4417744d349d41a1eb6ea28ef8ffad3831aa3e6317b698c24b3c1dc0ef60ed4e38564d21be4afc9a485ea22ec75dbe739f76a7
-
SSDEEP
786432:cQ1zPwv64YV/iSmT3kJtj88ZEP87mD+cmodF2fppwcPX/fzi82lb7O:hLB4YMhT0JtiKmiodiHvPWJlb7O
-
Quasar family
-
Quasar payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Creates new service(s)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
#524#@7asRFj438!!.exe
-
Size
3.1MB
-
MD5
09ffcbccc1a4884f357781111b762d2e
-
SHA1
386be8f85e983815580d9a83f635dd1a802886db
-
SHA256
38a42d31c6741ceeceedaf2ba07e753863a81bcfed604df7df03fcb975980c82
-
SHA512
d0f656806c760c0352699ff43125876a4f264da1675400d81ea085bec9341a5cdf9834c6d5eeef0b7df417a0a86acbaebbc9babd5848096612d15a57f4a668f4
-
SSDEEP
49152:avCI22SsaNYfdPBldt698dBcjHWjRJ6gbR3LoGdEsYaGTHHB72eh2NT:avP22SsaNYfdPBldt6+dBcjHWjRJ66H
-
Quasar family
-
Quasar payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
-
-
Target
Config.ini
-
Size
367B
-
MD5
7454df6cd0d28e81275ed4280bb78f3a
-
SHA1
2dcf07cabfd953c685fa6f2aae7d71eec33adee8
-
SHA256
767cba75d23ddcf7822abac7461053f3ddcc315ebe5974d31e7a2a8ac574c15f
-
SHA512
2bbb290f41909c1b0c4657cd385b896b0ae57041cd34e6204c6d3b61f0e42a49e2a72cd4d94296b93cd2ec49d2edf1ee2d2946045dceabdc58a8f293bca6378a
Score3/10 -
-
-
Target
HVCI/MbixMY.exe
-
Size
19.7MB
-
MD5
09e04205ee2e4b53e2bbaa249baf2598
-
SHA1
05da5d90f8bbca7fc3999da1bd9e2b0e11de0197
-
SHA256
60afe971d2f46a4ccf942b83c666a2f8a88927fea173fa99f227348f65cadcb0
-
SHA512
d5393035d8507cf51168873970ae76da51113f411bb3b1998ff73307d5ed4ea979fe4d61fd88db12d81c47ce815987f239762cc683b10dd749201c0c8c7ba2b5
-
SSDEEP
393216:lDahR5qGWQrGH+ipoatUWIDqBuH7iUFmO9BHq12s1T5oL34UMqt:lDapqGWe1bauqBXSmO7HQDtG0qt
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
HVCI/Steam.exe
-
Size
15.9MB
-
MD5
8aac8c3763433c4633f9df18099454d8
-
SHA1
488b942dc7da1066a2ca1531319dd91828501b44
-
SHA256
841b830d52ffa466dcf7bc00f47f9097634782b4028ecc512ffb0ffb49107a92
-
SHA512
200aabc46b9d25952906e3f6badab8802dd6fe2d3be598e92792ffdb6c2834042921ae441aae4c6cb8e51b9e1fadd2ad1a30f21ef7d0ff38da002b7b1ed96e7b
-
SSDEEP
393216:BYSiS7PfvNPUBiLB1VSNq/+FEQ7jPeF7Bp6ibY4Tj:BYiXvFUxQO2np6UTj
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Creates new service(s)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1