General
-
Target
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52
-
Size
2.6MB
-
Sample
220725-dpdssscebn
-
MD5
d9af38a14e01a4d4e273f79ebf0a4ab9
-
SHA1
8df4995a819f1784c02322b9e751aad23f7983f0
-
SHA256
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52
-
SHA512
9abe97764728bf5dd15b63639954f235e92077876a709b47329b77156df40c93ef510fbcf9a43bcc82da01425137241929ade5126f515a4aa34aca87ca7eaa50
Static task
static1
Behavioral task
behavioral1
Sample
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe
Resource
win7-20220715-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\1\Information.txt
qulab
http://teleg.run/QulabZ
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\1\Information.txt
qulab
http://teleg.run/QulabZ
Targets
-
-
Target
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52
-
Size
2.6MB
-
MD5
d9af38a14e01a4d4e273f79ebf0a4ab9
-
SHA1
8df4995a819f1784c02322b9e751aad23f7983f0
-
SHA256
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52
-
SHA512
9abe97764728bf5dd15b63639954f235e92077876a709b47329b77156df40c93ef510fbcf9a43bcc82da01425137241929ade5126f515a4aa34aca87ca7eaa50
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-