General

  • Target

    4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4

  • Size

    10.0MB

  • Sample

    230129-t8z35sfd7y

  • MD5

    d3471e1abea87cb9ab4aea1a89f9b2e9

  • SHA1

    67d6dac244049ed8de892d4235976df04c4423ba

  • SHA256

    4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4

  • SHA512

    9d59f49cd51b7f23641ca5c43ed413617b60e19308195af38cef49d30f0b4d4eb0118de600210968c561e1bda0310b33a397b953e9bf6e0d0112a9bc8366c779

  • SSDEEP

    196608:dSbvo4WSRKekmQ/8bOg63iJ1Y87GjQUyMqywWK4R1j5X6:dSUokmQ/8bORSJ1YRVLpwWKiB5

Malware Config

Targets

    • Target

      4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4

    • Size

      10.0MB

    • MD5

      d3471e1abea87cb9ab4aea1a89f9b2e9

    • SHA1

      67d6dac244049ed8de892d4235976df04c4423ba

    • SHA256

      4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4

    • SHA512

      9d59f49cd51b7f23641ca5c43ed413617b60e19308195af38cef49d30f0b4d4eb0118de600210968c561e1bda0310b33a397b953e9bf6e0d0112a9bc8366c779

    • SSDEEP

      196608:dSbvo4WSRKekmQ/8bOg63iJ1Y87GjQUyMqywWK4R1j5X6:dSUokmQ/8bORSJ1YRVLpwWKiB5

    • Qulab Stealer & Clipper

      Infostealer and clipper created with AutoIt.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Defense Evasion

Hidden Files and Directories

2
T1158

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks