A PAINFUL QUICKHEAL
Dec. 16, 2024, 2:33 p.m.
Tags
External References
Description
This report analyzes a QUICKHEAL malware sample associated with the Chinese PLA-linked Needleminer group. The 32-bit DLL, protected by VMProtect, targets the telecom sector and was compiled in April 2022. It can steal credentials from Firefox and Internet Explorer browsers. The malware communicates with a C2 server using HTTP and attempts to establish connections via proxy. It employs various obfuscation techniques, including renaming cmd.exe and using a custom API resolver. The attackers' infrastructure, spanning multiple years and campaigns, shows poor operational security but targets diverse sectors and countries, including India, South Korea, and potentially the Middle East.
Date
Published: Dec. 16, 2024, 1:03 p.m.
Created: Dec. 16, 2024, 1:03 p.m.
Modified: Dec. 16, 2024, 2:33 p.m.
Attack Patterns
QUICKHEAL
Needleminer
T1555.003
T1027.002
T1571
T1087
T1056.001
T1555
T1082
T1083
T1140
T1027
T1112
Additional Informations
Space
Telecommunications
Government
British Indian Ocean Territory
India