General
-
Target
4666c384a4c3443ac704b4fd1311a3c7.exe
-
Size
300KB
-
Sample
230316-tqslcaea4z
-
MD5
4666c384a4c3443ac704b4fd1311a3c7
-
SHA1
13cda634b73feab1db7e9f021837d3bf3be094eb
-
SHA256
c30c055cfc659818b2b25a7fe19885a8737f6e513f421a21c1a5eaf72158b02c
-
SHA512
87e9176ce3926244af2580aadd00d5420266cd026cfd38d0784e01c79d7cb945aa926ab09111ee7b33a38aa31f5ecb65fd74cb1590a86de7b91271fe2c4eb8ef
-
SSDEEP
3072:lRx2ALdis854nZr2UCPMh6FddAztieF0MjNsvauCaoh8lDaNlf8:nxVL/A4ARddAyMja58
Static task
static1
Behavioral task
behavioral1
Sample
4666c384a4c3443ac704b4fd1311a3c7.exe
Resource
win7-20230220-en
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Targets
-
-
Target
4666c384a4c3443ac704b4fd1311a3c7.exe
-
Size
300KB
-
MD5
4666c384a4c3443ac704b4fd1311a3c7
-
SHA1
13cda634b73feab1db7e9f021837d3bf3be094eb
-
SHA256
c30c055cfc659818b2b25a7fe19885a8737f6e513f421a21c1a5eaf72158b02c
-
SHA512
87e9176ce3926244af2580aadd00d5420266cd026cfd38d0784e01c79d7cb945aa926ab09111ee7b33a38aa31f5ecb65fd74cb1590a86de7b91271fe2c4eb8ef
-
SSDEEP
3072:lRx2ALdis854nZr2UCPMh6FddAztieF0MjNsvauCaoh8lDaNlf8:nxVL/A4ARddAyMja58
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-