General
-
Target
tmp
-
Size
290KB
-
Sample
230319-qlpr4sge42
-
MD5
e681980e0fe13cc6b03d145f993f6d57
-
SHA1
55c90ca0e3558e3227980cc1c083e14694c7b3f7
-
SHA256
6eca42031f2809aca73b3cc3296cde7d49852f2ed14985c3093c10244d22376d
-
SHA512
c2d6bef9ce2782ce7cd2f657773ac69ccb8bf5ea32cfd2cc7bdaa42df1334d784bef52286025294ea6220a41c8de51e6a938110ae573f14ec761d09a36578917
-
SSDEEP
6144:gNnHLcUZsHVqxCpKbz+44XfQvW5xRPvPhO:gNnHAUSwJb64A5HHPh
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Targets
-
-
Target
tmp
-
Size
290KB
-
MD5
e681980e0fe13cc6b03d145f993f6d57
-
SHA1
55c90ca0e3558e3227980cc1c083e14694c7b3f7
-
SHA256
6eca42031f2809aca73b3cc3296cde7d49852f2ed14985c3093c10244d22376d
-
SHA512
c2d6bef9ce2782ce7cd2f657773ac69ccb8bf5ea32cfd2cc7bdaa42df1334d784bef52286025294ea6220a41c8de51e6a938110ae573f14ec761d09a36578917
-
SSDEEP
6144:gNnHLcUZsHVqxCpKbz+44XfQvW5xRPvPhO:gNnHAUSwJb64A5HHPh
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-