We discovered additional insights complementing the CYFIRMA Research report on the 'QWERTY Stealer' sample (369d8855d2531dce55d046735ff9a26ee4441f3f4509aad35f570c0a0b567c5d).

Our analysis attributes this sample to the DoNot_Downloader family, which is linked to APT_C_35, also known as the DoNotTeam.

Our attribution is based on function level code reuse, with 65 functions in the QWERTY Stealer sample matching those found in previous DoNot_Downloader variants.

Additionally, our code search engine automatically found that the Cyfirma sample shares a 90% code overlap with a previous variant (4ef9133773d596d1c888b0ffe36287a810042172b0af0dfad8c2b0c9875d1c65) identified as DoNot Downloader by Check Point Software in a report from spring 2024.

This finding is further validated by the “donot_downloader” Yara rule from the Checkpoint report, which matches both samples to the DoNot_Downloader family.

The only difference between the two samples, is that the Cyfirma sample is missing persistence functionality.

Ready to find out how Threatray can protect your organization?

Talk to an expert