General
-
Target
OperaSetup.exe
-
Size
6.1MB
-
Sample
230802-k21xesfa3z
-
MD5
187340d0966252e19cd25234908be33d
-
SHA1
47d9e8f4be1f2cb8dc9e979ce17344b2a906de4e
-
SHA256
1c041ceec32a88f14ba0705059598af65206ab7a61abff23b012b95928890d59
-
SHA512
7f63b5567ef65b3aa98331f27699b3f88f0ed3f793567427998770d185a80714b1a74d3ea6492ab3456df2f1f59c498032d07eaa41751c3cd29e02dbd8e90853
-
SSDEEP
98304:gGh5ziNlRUaub+MPDrc/c+NmXnKyFrsqC4HIs2iTa2UUePNlcF134zJM70TR16r:g3NlqaubXgUCqCmjmMii
Behavioral task
behavioral1
Sample
OperaSetup.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
OperaSetup.exe
Resource
win10-20230703-en
Malware Config
Extracted
quasar
-
reconnect_delay
3000
Extracted
quasar
1.0
Opera
RomaPro28937723-49554.portmap.io:49554
dbdeb9e2-1d62-453a-8c06-8a6bf4be3071
-
encryption_key
8A2A7B58F2803115FF796E733C7311493928333B
-
install_name
launcher.exe
-
log_directory
Opera Logs
-
reconnect_delay
3000
-
startup_key
Opera Launcher
-
subdirectory
Opera Software
Targets
-
-
Target
OperaSetup.exe
-
Size
6.1MB
-
MD5
187340d0966252e19cd25234908be33d
-
SHA1
47d9e8f4be1f2cb8dc9e979ce17344b2a906de4e
-
SHA256
1c041ceec32a88f14ba0705059598af65206ab7a61abff23b012b95928890d59
-
SHA512
7f63b5567ef65b3aa98331f27699b3f88f0ed3f793567427998770d185a80714b1a74d3ea6492ab3456df2f1f59c498032d07eaa41751c3cd29e02dbd8e90853
-
SSDEEP
98304:gGh5ziNlRUaub+MPDrc/c+NmXnKyFrsqC4HIs2iTa2UUePNlcF134zJM70TR16r:g3NlqaubXgUCqCmjmMii
-
Quasar payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-