General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://67.191.63.138/
Resource
win10ltsc2021-20241023-en
windows10-ltsc 2021-x64
13 signatures
150 seconds
Malware Config
Extracted
Credentials
Protocol: ftp- Host:
ftp.spaceface.site - Port:
21 - Username:
[email protected] - Password:
Billy123#
Extracted
Family
quasar
Version
1.4.0
Botnet
bot
C2
67.191.63.138:4781
Mutex
5e71212f-3f9b-4da2-b7e1-c0a0e90d92f3
Attributes
-
encryption_key
69F476AEBC36CDCB235187230CF3F99552BD1703
-
install_name
tasker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
tasker
-
subdirectory
Tasks
Targets
-
-
Target
http://67.191.63.138/
-
Quasar family
-
Quasar payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-