General

  • Target

    Client-built.exe

  • Size

    3.2MB

  • Sample

    230723-lgbbpsdg37

  • MD5

    0c1ec7f96d7075a604abe1f8b2725464

  • SHA1

    0cba36b0af29f8bd62cbd5734f59db80f1ad5b71

  • SHA256

    c1f6dc96c484bc241b7693aed4b5350ac4bb04c573bc61479849141b8707254c

  • SHA512

    84b84129ad26b1d0e3e3fc452797339b77ae7b2a6787fd7a5179b1d4849887c3f35ec0376ba127facf96c7ae828a2481f0eb813366327295050ec9a77d1f18fe

  • SSDEEP

    49152:mvIt62XlaSFNWPjljiFa2RoUYIYNxNESE+k/iQLoGdiOjPTHHB72eh2NT:mvE62XlaSFNWPjljiFXRoUYI6xtub

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Opera

C2

6.tcp.eu.ngrok.io:19271

Mutex

feb69ae7-695d-40ed-89a2-04ef8bd51b77

Attributes
  • encryption_key

    BE406BCA39FA7E9CE29EAD78E1350B24413E24BF

  • install_name

    launcher.exe

  • log_directory

    Opera Logs

  • reconnect_delay

    3000

  • startup_key

    Opera Launcher

  • subdirectory

    Opera Software

Targets

    • Target

      Client-built.exe

    • Size

      3.2MB

    • MD5

      0c1ec7f96d7075a604abe1f8b2725464

    • SHA1

      0cba36b0af29f8bd62cbd5734f59db80f1ad5b71

    • SHA256

      c1f6dc96c484bc241b7693aed4b5350ac4bb04c573bc61479849141b8707254c

    • SHA512

      84b84129ad26b1d0e3e3fc452797339b77ae7b2a6787fd7a5179b1d4849887c3f35ec0376ba127facf96c7ae828a2481f0eb813366327295050ec9a77d1f18fe

    • SSDEEP

      49152:mvIt62XlaSFNWPjljiFa2RoUYIYNxNESE+k/iQLoGdiOjPTHHB72eh2NT:mvE62XlaSFNWPjljiFXRoUYI6xtub

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks