General
-
Target
49b8fccdb9059ec9d100159ecd7b0a9d1e03928d6c40340d99c94757001c9184
-
Size
3.7MB
-
Sample
220712-s9e9pabec2
-
MD5
e6d939a4cbc17992753b158c1173451c
-
SHA1
90d8898167449cd08ba3a1728432e681a8754db5
-
SHA256
49b8fccdb9059ec9d100159ecd7b0a9d1e03928d6c40340d99c94757001c9184
-
SHA512
b14222727e86440fe3173f2c6ce5a7b41b1da3151c78e406fdce525bb692fccc71a2df17a1a064dfc9199ce35b8459256a707b698ef06819df354d7df48098c6
Static task
static1
Behavioral task
behavioral1
Sample
49b8fccdb9059ec9d100159ecd7b0a9d1e03928d6c40340d99c94757001c9184.exe
Resource
win7-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\1\Information.txt
qulab
http://teleg.run/QulabZ
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\1\Information.txt
qulab
http://teleg.run/QulabZ
Targets
-
-
Target
49b8fccdb9059ec9d100159ecd7b0a9d1e03928d6c40340d99c94757001c9184
-
Size
3.7MB
-
MD5
e6d939a4cbc17992753b158c1173451c
-
SHA1
90d8898167449cd08ba3a1728432e681a8754db5
-
SHA256
49b8fccdb9059ec9d100159ecd7b0a9d1e03928d6c40340d99c94757001c9184
-
SHA512
b14222727e86440fe3173f2c6ce5a7b41b1da3151c78e406fdce525bb692fccc71a2df17a1a064dfc9199ce35b8459256a707b698ef06819df354d7df48098c6
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-