General
-
Target
OperaSetup.exe
-
Size
6.0MB
-
Sample
230723-memsdsed8v
-
MD5
6e9a5eb6cf78a859c57f941b97e1fa15
-
SHA1
8c7fa34eb9536c54bdb49939881a5010cd33eb9b
-
SHA256
ed4cbfe246783bd7a7d124ac8f67e208f968a805264c3c6883fe77ac8fc4e72c
-
SHA512
e8a72ba8b33a480b391a739c2bfef12bbe2e933deb70851de60c940bce353c12dea5070e5ed2d2effc405a9ad49dc62afac23bd1685a27e7f2907bdd72eeba64
-
SSDEEP
98304:jGh5ziNlRUaub+MPDrc/c+NmXnKyFrsqCdvE62XlaSFNWPjljiFXRoUYIB4dB:j3NlqaubXgUCqCRcZYnB
Malware Config
Extracted
quasar
-
reconnect_delay
3000
Extracted
quasar
1.4.1
Opera
6.tcp.eu.ngrok.io:19271
feb69ae7-695d-40ed-89a2-04ef8bd51b77
-
encryption_key
BE406BCA39FA7E9CE29EAD78E1350B24413E24BF
-
install_name
launcher.exe
-
log_directory
Opera Logs
-
reconnect_delay
3000
-
startup_key
Opera Launcher
-
subdirectory
Opera Software
Targets
-
-
Target
OperaSetup.exe
-
Size
6.0MB
-
MD5
6e9a5eb6cf78a859c57f941b97e1fa15
-
SHA1
8c7fa34eb9536c54bdb49939881a5010cd33eb9b
-
SHA256
ed4cbfe246783bd7a7d124ac8f67e208f968a805264c3c6883fe77ac8fc4e72c
-
SHA512
e8a72ba8b33a480b391a739c2bfef12bbe2e933deb70851de60c940bce353c12dea5070e5ed2d2effc405a9ad49dc62afac23bd1685a27e7f2907bdd72eeba64
-
SSDEEP
98304:jGh5ziNlRUaub+MPDrc/c+NmXnKyFrsqCdvE62XlaSFNWPjljiFXRoUYIB4dB:j3NlqaubXgUCqCRcZYnB
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-