Behavioral task
behavioral1
Sample
2712-356-0x0000000000400000-0x0000000000803000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2712-356-0x0000000000400000-0x0000000000803000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
2712-356-0x0000000000400000-0x0000000000803000-memory.dmp
-
Size
4.0MB
-
MD5
b35647c42953b731c75c06e3f735f521
-
SHA1
390cf5e86e1128ae1a97219d5bbf9a2fa5e014b7
-
SHA256
b313dd185609a584784946e600d25f9d312a2c8fe62ac482685127b0329468db
-
SHA512
e28ed509682b38219854b8c7a8a0f682dfd216e8cbd61c7de16fe38559bc2b1c7ee9c63103b007d3afae95ffada26b9a1a24447209b3d48c3d477fb194ca1edc
-
SSDEEP
49152:WeCseICR7NWm8qpHakXvLQh0/50OiwF5pDRXxRA0VF18L:WeCrXv0W/BpDRXaL
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172
Signatures
-
Laplas family
Files
-
2712-356-0x0000000000400000-0x0000000000803000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 213KB - Virtual size: 407KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 988B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.symtab Size: 512B - Virtual size: 4B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ