General
-
Target
44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee
-
Size
2.3MB
-
Sample
220707-wd3xnafdh7
-
MD5
2eb99757f1af96d5fd9ec9ecf75f1eef
-
SHA1
822f9bfe95ec15e834deae9124ee7883c70d302e
-
SHA256
44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee
-
SHA512
17b0db88f6625e369d6d4e7eef58ec6a66b16aa4d7474527bbb4cfd09602cc058b81148d033acecf319c87785e80e6189d47ce20b4954f6a25d37a552c40891b
Static task
static1
Behavioral task
behavioral1
Sample
44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe
Resource
win7-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\1\Information.txt
qulab
http://teleg.run/QulabZ
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\1\Information.txt
qulab
http://teleg.run/QulabZ
Targets
-
-
Target
44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee
-
Size
2.3MB
-
MD5
2eb99757f1af96d5fd9ec9ecf75f1eef
-
SHA1
822f9bfe95ec15e834deae9124ee7883c70d302e
-
SHA256
44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee
-
SHA512
17b0db88f6625e369d6d4e7eef58ec6a66b16aa4d7474527bbb4cfd09602cc058b81148d033acecf319c87785e80e6189d47ce20b4954f6a25d37a552c40891b
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-