General
-
Target
fd82f497d37d39f0bdc6db9a32f6474d1820327a5de1d8dc1dd0fd7274caace4
-
Size
296KB
-
Sample
230317-25t2qaad27
-
MD5
36f97cccfd413197f98b4943fbdaa875
-
SHA1
3bb5148f4736e5f4f39807c46ad75b8997e7ce03
-
SHA256
fd82f497d37d39f0bdc6db9a32f6474d1820327a5de1d8dc1dd0fd7274caace4
-
SHA512
66171982f19800842def287d2ed0e742f687f4ca492d83111f0b601d0cb179e3a7b70928ef1de2183d7389922b49344fe239306d934dc2f101ce27b1e07b55e8
-
SSDEEP
6144:4gHLQoCNTP523ANRNKD3xu+X9GmYLwHu:4gHkoCV5CANRNKD3o+w4Hu
Static task
static1
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Targets
-
-
Target
fd82f497d37d39f0bdc6db9a32f6474d1820327a5de1d8dc1dd0fd7274caace4
-
Size
296KB
-
MD5
36f97cccfd413197f98b4943fbdaa875
-
SHA1
3bb5148f4736e5f4f39807c46ad75b8997e7ce03
-
SHA256
fd82f497d37d39f0bdc6db9a32f6474d1820327a5de1d8dc1dd0fd7274caace4
-
SHA512
66171982f19800842def287d2ed0e742f687f4ca492d83111f0b601d0cb179e3a7b70928ef1de2183d7389922b49344fe239306d934dc2f101ce27b1e07b55e8
-
SSDEEP
6144:4gHLQoCNTP523ANRNKD3xu+X9GmYLwHu:4gHkoCV5CANRNKD3o+w4Hu
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-