General
-
Target
223c077f6eeb0ff32fd5c932f5a4dd311feb4e0156e2d464a6cb9a3645dede90
-
Size
301KB
-
Sample
230318-j2pzgsbf64
-
MD5
3cb930fc50c931ee8d8eb36f9a239fc3
-
SHA1
dc716aa31de06e05c56718b25a5dda5908963a11
-
SHA256
223c077f6eeb0ff32fd5c932f5a4dd311feb4e0156e2d464a6cb9a3645dede90
-
SHA512
e8020f7210d47d4a21bc1d659bfa1f29d875f51ff5264975225b0274520ea83f318498cfbbd5d901cd22dbb80a7bce99a27b1dc3689af994fed9affb25bbb3e0
-
SSDEEP
3072:PMD/w1LQ/WAY4aJy/vq4oh/JVH7B4RiaNuv/JX580tP+L:Qw1LQeAYbJr4Sp/0uHIw+L
Static task
static1
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Targets
-
-
Target
223c077f6eeb0ff32fd5c932f5a4dd311feb4e0156e2d464a6cb9a3645dede90
-
Size
301KB
-
MD5
3cb930fc50c931ee8d8eb36f9a239fc3
-
SHA1
dc716aa31de06e05c56718b25a5dda5908963a11
-
SHA256
223c077f6eeb0ff32fd5c932f5a4dd311feb4e0156e2d464a6cb9a3645dede90
-
SHA512
e8020f7210d47d4a21bc1d659bfa1f29d875f51ff5264975225b0274520ea83f318498cfbbd5d901cd22dbb80a7bce99a27b1dc3689af994fed9affb25bbb3e0
-
SSDEEP
3072:PMD/w1LQ/WAY4aJy/vq4oh/JVH7B4RiaNuv/JX580tP+L:Qw1LQeAYbJr4Sp/0uHIw+L
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-