General
-
Target
79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718
-
Size
1.5MB
-
Sample
220521-nwyrnaeca7
-
MD5
9718430597e4c4129c5a76346a5e0da7
-
SHA1
1dcb1d6af722ac2dfe64b02e5c95ea756af53732
-
SHA256
79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718
-
SHA512
84c1cd9761c11af95b31d5cf1f52ccf5eeb837ae585fb63d2f2be3f69a8bb7aece4f1d37c00325bd8bf66e3881cf8f72e2fc42f047f66a6641ff86e0f87ae3b5
Static task
static1
Behavioral task
behavioral1
Sample
79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718.exe
Resource
win7-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\1\Information.txt
qulab
http://teleg.run/QulabZ
Targets
-
-
Target
79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718
-
Size
1.5MB
-
MD5
9718430597e4c4129c5a76346a5e0da7
-
SHA1
1dcb1d6af722ac2dfe64b02e5c95ea756af53732
-
SHA256
79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718
-
SHA512
84c1cd9761c11af95b31d5cf1f52ccf5eeb837ae585fb63d2f2be3f69a8bb7aece4f1d37c00325bd8bf66e3881cf8f72e2fc42f047f66a6641ff86e0f87ae3b5
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-