General
-
Target
311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2
-
Size
1.8MB
-
Sample
221125-la1m1sfg47
-
MD5
a3476e4532c77e8ee20ecabd1035d3fd
-
SHA1
15d58869b7ed04c16b3143ab1ee0e085056363bd
-
SHA256
311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2
-
SHA512
7d64b2923bc4a501af7afe21cf7be36a4f947e18a753be7307982d65b221ee3de410f11d9a314b894d8de33b8031dec7feaf2e874e847187c1e7245c7849759b
-
SSDEEP
49152:Mh+ZkldoPK8Yadnm74l1QeWRCZuC4gOZtHN:d2cPK8r7XbWRCZhOZtH
Static task
static1
Behavioral task
behavioral1
Sample
311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exe
Resource
win7-20220812-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\1\Information.txt
qulab
http://teleg.run/QulabZ
Extracted
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\1\Information.txt
qulab
http://teleg.run/QulabZ
Targets
-
-
Target
311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2
-
Size
1.8MB
-
MD5
a3476e4532c77e8ee20ecabd1035d3fd
-
SHA1
15d58869b7ed04c16b3143ab1ee0e085056363bd
-
SHA256
311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2
-
SHA512
7d64b2923bc4a501af7afe21cf7be36a4f947e18a753be7307982d65b221ee3de410f11d9a314b894d8de33b8031dec7feaf2e874e847187c1e7245c7849759b
-
SSDEEP
49152:Mh+ZkldoPK8Yadnm74l1QeWRCZuC4gOZtHN:d2cPK8r7XbWRCZhOZtH
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-