General
-
Target
Client-built.exe
-
Size
3.2MB
-
Sample
230723-lgbbpsdg37
-
MD5
0c1ec7f96d7075a604abe1f8b2725464
-
SHA1
0cba36b0af29f8bd62cbd5734f59db80f1ad5b71
-
SHA256
c1f6dc96c484bc241b7693aed4b5350ac4bb04c573bc61479849141b8707254c
-
SHA512
84b84129ad26b1d0e3e3fc452797339b77ae7b2a6787fd7a5179b1d4849887c3f35ec0376ba127facf96c7ae828a2481f0eb813366327295050ec9a77d1f18fe
-
SSDEEP
49152:mvIt62XlaSFNWPjljiFa2RoUYIYNxNESE+k/iQLoGdiOjPTHHB72eh2NT:mvE62XlaSFNWPjljiFXRoUYI6xtub
Malware Config
Extracted
quasar
1.4.1
Opera
6.tcp.eu.ngrok.io:19271
feb69ae7-695d-40ed-89a2-04ef8bd51b77
-
encryption_key
BE406BCA39FA7E9CE29EAD78E1350B24413E24BF
-
install_name
launcher.exe
-
log_directory
Opera Logs
-
reconnect_delay
3000
-
startup_key
Opera Launcher
-
subdirectory
Opera Software
Targets
-
-
Target
Client-built.exe
-
Size
3.2MB
-
MD5
0c1ec7f96d7075a604abe1f8b2725464
-
SHA1
0cba36b0af29f8bd62cbd5734f59db80f1ad5b71
-
SHA256
c1f6dc96c484bc241b7693aed4b5350ac4bb04c573bc61479849141b8707254c
-
SHA512
84b84129ad26b1d0e3e3fc452797339b77ae7b2a6787fd7a5179b1d4849887c3f35ec0376ba127facf96c7ae828a2481f0eb813366327295050ec9a77d1f18fe
-
SSDEEP
49152:mvIt62XlaSFNWPjljiFa2RoUYIYNxNESE+k/iQLoGdiOjPTHHB72eh2NT:mvE62XlaSFNWPjljiFXRoUYI6xtub
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-