General
-
Target
6bc36072ba2438cf3c8a54962e4374c5445769791409f10dec3ac6e7bb2101fc
-
Size
330KB
-
Sample
230319-gxm8zsfb93
-
MD5
82c5b77739937f39594e85048923100c
-
SHA1
8c760c3b2ca07df514a79f5b0234907be37449e7
-
SHA256
6bc36072ba2438cf3c8a54962e4374c5445769791409f10dec3ac6e7bb2101fc
-
SHA512
5023dc7ccf394de4ed0a1da3314ae6c18972dc1c5d307106c3fbc3f18b510f91d0c30910480b3ab7aa121a37a4979b1f498d22e4a4c2e50add423a0fbfe29d3c
-
SSDEEP
3072:dAVl0ob1/LPwjzfM/sDJ0NL75Fl3y/10j8bnq+tqh1wrUaCzIDK2RVotRHx:eVBb1/LIjzPDJ0BkNq7+ts1oTKSgH
Static task
static1
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Targets
-
-
Target
6bc36072ba2438cf3c8a54962e4374c5445769791409f10dec3ac6e7bb2101fc
-
Size
330KB
-
MD5
82c5b77739937f39594e85048923100c
-
SHA1
8c760c3b2ca07df514a79f5b0234907be37449e7
-
SHA256
6bc36072ba2438cf3c8a54962e4374c5445769791409f10dec3ac6e7bb2101fc
-
SHA512
5023dc7ccf394de4ed0a1da3314ae6c18972dc1c5d307106c3fbc3f18b510f91d0c30910480b3ab7aa121a37a4979b1f498d22e4a4c2e50add423a0fbfe29d3c
-
SSDEEP
3072:dAVl0ob1/LPwjzfM/sDJ0NL75Fl3y/10j8bnq+tqh1wrUaCzIDK2RVotRHx:eVBb1/LIjzPDJ0BkNq7+ts1oTKSgH
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-