Behavioral task
behavioral1
Sample
1080-197-0x0000000000400000-0x0000000002C8E000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1080-197-0x0000000000400000-0x0000000002C8E000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1080-197-0x0000000000400000-0x0000000002C8E000-memory.dmp
-
Size
40.6MB
-
MD5
c17d5198aff6865db578e90de03aa38c
-
SHA1
735c106a1e9fcd152fc9fada751aecb6fe1055c0
-
SHA256
e8c1b27738283f23c8dac268e84cee79a39183ab90f2e28948b91359945e1b68
-
SHA512
a926d9b2bf4b8ac78c8044330c533ecfa84449c8cf696af4d27bf52c4d5b4114746d24666f6d1a134e07a3da33dec8f16cc715a524cdafeb26aba3f98b7f7ca2
-
SSDEEP
49152:peCseICR7NWm8qpHakXvLQh0/50OikF5pDRXxRh0VF1f4L:peCrXv0W/9pDRXE4L
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Signatures
-
Laplas family
Files
-
1080-197-0x0000000000400000-0x0000000002C8E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 213KB - Virtual size: 407KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 988B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.symtab Size: 512B - Virtual size: 4B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ