General
-
Target
11b80af6cb8bffedc46b7586644a29e9854ec440421926d7acd40e80b5ba08be
-
Size
10.5MB
-
Sample
230316-tepqbabf39
-
MD5
d75c660c2584891aa2072643e345c941
-
SHA1
cc3ed51870ecd89963428c4d3638c8a99d0ea991
-
SHA256
11b80af6cb8bffedc46b7586644a29e9854ec440421926d7acd40e80b5ba08be
-
SHA512
8a9ab5f164b7268ff56529c35bf97dccedff20f822e2a4daabc97e0af7cfd9f31593df440a337e6b9d84db60e5ed0be6f238545f367dada3012c54f4c61bd7d6
-
SSDEEP
196608:e+la0xOiukoEzn0quVFJ/ODw+lxihvwo:e+s0mDHVFo7Aw
Static task
static1
Malware Config
Extracted
laplas
http://193.233.20.134
-
api_key
57728dce0f7018e17faf9f061cb2d77048e08414376baf6d860b78e74e83c208
Targets
-
-
Target
11b80af6cb8bffedc46b7586644a29e9854ec440421926d7acd40e80b5ba08be
-
Size
10.5MB
-
MD5
d75c660c2584891aa2072643e345c941
-
SHA1
cc3ed51870ecd89963428c4d3638c8a99d0ea991
-
SHA256
11b80af6cb8bffedc46b7586644a29e9854ec440421926d7acd40e80b5ba08be
-
SHA512
8a9ab5f164b7268ff56529c35bf97dccedff20f822e2a4daabc97e0af7cfd9f31593df440a337e6b9d84db60e5ed0be6f238545f367dada3012c54f4c61bd7d6
-
SSDEEP
196608:e+la0xOiukoEzn0quVFJ/ODw+lxihvwo:e+s0mDHVFo7Aw
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-