General
-
Target
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab
-
Size
1.8MB
-
Sample
220724-z43w5aghdj
-
MD5
ac23006ea8607c0a43f023bb29f4b4f4
-
SHA1
de98056c9d37c9e9696d2b057bef228577d47d93
-
SHA256
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab
-
SHA512
5d23729ac07aa39abe4ed990b03068dd2a68f0e6429001ec97eb150793625158acd5185c07df1ba6abc3ddbe68140179508b8e4b05043e3fd376897abf00dc19
Static task
static1
Behavioral task
behavioral1
Sample
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe
Resource
win7-20220718-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Targets
-
-
Target
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab
-
Size
1.8MB
-
MD5
ac23006ea8607c0a43f023bb29f4b4f4
-
SHA1
de98056c9d37c9e9696d2b057bef228577d47d93
-
SHA256
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab
-
SHA512
5d23729ac07aa39abe4ed990b03068dd2a68f0e6429001ec97eb150793625158acd5185c07df1ba6abc3ddbe68140179508b8e4b05043e3fd376897abf00dc19
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-