General
-
Target
58fdef0ce9400990141d80e87e636dc61c8d0d320a6b5996274f774a0cb19ee3
-
Size
1.8MB
-
Sample
220724-gksb6shfa5
-
MD5
073b241eb2c930735b7018c70d19d989
-
SHA1
4010568d660b07da6b3405d137181423ee23d956
-
SHA256
58fdef0ce9400990141d80e87e636dc61c8d0d320a6b5996274f774a0cb19ee3
-
SHA512
ed118dfd74356dbcec198d9f6acc64803c0923a9895929225cbcaf5b966a3c6ae40dc6d97f4ae8e6b2a55237470bfe8577dfd6a275898ed37d5b9fadb7985efc
Static task
static1
Behavioral task
behavioral1
Sample
58fdef0ce9400990141d80e87e636dc61c8d0d320a6b5996274f774a0cb19ee3.exe
Resource
win7-20220715-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-d..iagnostic.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Targets
-
-
Target
58fdef0ce9400990141d80e87e636dc61c8d0d320a6b5996274f774a0cb19ee3
-
Size
1.8MB
-
MD5
073b241eb2c930735b7018c70d19d989
-
SHA1
4010568d660b07da6b3405d137181423ee23d956
-
SHA256
58fdef0ce9400990141d80e87e636dc61c8d0d320a6b5996274f774a0cb19ee3
-
SHA512
ed118dfd74356dbcec198d9f6acc64803c0923a9895929225cbcaf5b966a3c6ae40dc6d97f4ae8e6b2a55237470bfe8577dfd6a275898ed37d5b9fadb7985efc
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-