General
-
Target
788f40e71fe7def232556f15af985c2f9058a0d4a3155548b91b5f46bf04fa92
-
Size
333KB
-
Sample
230318-lasmeabg72
-
MD5
355e5ef847eec83cc3ee16ae14458193
-
SHA1
9fdaf87c11821aef8eb9e6d2a02cee0410265b7f
-
SHA256
788f40e71fe7def232556f15af985c2f9058a0d4a3155548b91b5f46bf04fa92
-
SHA512
e876db75d13147474e12046b51b1396beb31b5838abc9c9f61cc4e13dfab1818283e37ff83b0d52aaeadfef1da8f6949f1025e8564029e22f309ff29124f2ff7
-
SSDEEP
6144:BUbj1/LNDnlBqT0xUQZZVertj2KRd2PRTQNc/Q:y1/JDnlBqTWcoKX2JTSc/
Static task
static1
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Targets
-
-
Target
788f40e71fe7def232556f15af985c2f9058a0d4a3155548b91b5f46bf04fa92
-
Size
333KB
-
MD5
355e5ef847eec83cc3ee16ae14458193
-
SHA1
9fdaf87c11821aef8eb9e6d2a02cee0410265b7f
-
SHA256
788f40e71fe7def232556f15af985c2f9058a0d4a3155548b91b5f46bf04fa92
-
SHA512
e876db75d13147474e12046b51b1396beb31b5838abc9c9f61cc4e13dfab1818283e37ff83b0d52aaeadfef1da8f6949f1025e8564029e22f309ff29124f2ff7
-
SSDEEP
6144:BUbj1/LNDnlBqT0xUQZZVertj2KRd2PRTQNc/Q:y1/JDnlBqTWcoKX2JTSc/
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-