Today > 2 Critical | 11 High | 12 Medium vulnerabilities   -   You can now download lists of IOCs here!

A PAINFUL QUICKHEAL

Dec. 16, 2024, 2:33 p.m.

Description

This report analyzes a QUICKHEAL malware sample associated with the Chinese PLA-linked Needleminer group. The 32-bit DLL, protected by VMProtect, targets the telecom sector and was compiled in April 2022. It can steal credentials from Firefox and Internet Explorer browsers. The malware communicates with a C2 server using HTTP and attempts to establish connections via proxy. It employs various obfuscation techniques, including renaming cmd.exe and using a custom API resolver. The attackers' infrastructure, spanning multiple years and campaigns, shows poor operational security but targets diverse sectors and countries, including India, South Korea, and potentially the Middle East.

Date

Published: Dec. 16, 2024, 1:03 p.m.

Created: Dec. 16, 2024, 1:03 p.m.

Modified: Dec. 16, 2024, 2:33 p.m.

Attack Patterns

QUICKHEAL

Needleminer

T1555.003

T1027.002

T1571

T1087

T1056.001

T1555

T1082

T1083

T1140

T1027

T1112

Additional Informations

Space

Telecommunications

Government

British Indian Ocean Territory

India