Skip to content Dark Web Informer - Cyber Threat Intelligence
IOC

IOC Alert: Quasar RAT Command-and-Control Domain via Ngrok Tunnel

📖 Overview

A command-and-control (C2) endpoint leveraging Ngrok tunneling infrastructure has been identified in association with Quasar RAT operations. The domain 10.tcp.eu.ngrok.io was observed resolving to an AWS-hosted IP address. While the Ngrok tunnel is currently inactive and displays an error page, this infrastructure is often used by threat actors for temporary or disposable C2 endpoints. Confidence is assessed at 100%.


📌 Key Details

FieldInformation
TypeDomain
Indicator10.tcp.eu.ngrok[.]io
Threat TypeBotnet C2
Malwarewin.quasar_rat
Confidence100%
Date28 Oct 2025 – 18:01:15 UTC
Tagsc2, domain, quasar, RAT, triage
ReporterDonPasci
ReferenceTriage Sandbox Report

🔎 URLScan Result


📡 Domain & Certificate Info

  • DNS A Record: 18[.]195[.]122[.]13


🛡️ Defensive Guidance

  • Block 10.tcp.eu.ngrok[.]io and related Ngrok subdomains in perimeter and endpoint security policies.
  • Monitor for Quasar RAT indicators, such as outbound TCP connections to Ngrok tunnels or unusual persistence activity (registry edits, WMI subscriptions).
  • Detect and block Ngrok tunnels used in non-development environments to prevent misuse for covert remote access.
  • Audit outbound connections to AWS IP ranges hosting transient C2 endpoints.

⚠️ This IOC highlights the increasing abuse of Ngrok tunneling services by remote access trojans like Quasar RAT, enabling threat actors to establish short-lived, encrypted C2 channels that easily bypass traditional perimeter defenses.

Latest