General
-
Target
29d41c9566739f5371b7e2c1142ffb3c55fe8771d1e4d872d4755ca1f6141f53
-
Size
290KB
-
Sample
230319-r7rz2agg77
-
MD5
882337ff518b678a241e9930c98b14e6
-
SHA1
4cadcd7924e98bab2df7bb3fde737ccce8a6347b
-
SHA256
29d41c9566739f5371b7e2c1142ffb3c55fe8771d1e4d872d4755ca1f6141f53
-
SHA512
21f51aac938e2111f72f576255c133471156bb70f70579d257cd97cb582d6b0a30dca0cdbdfd5349e6c0969a4722eb3b2ecd5d812df08f3fdf860553e9b885e6
-
SSDEEP
3072:mIvn7Ly3sk9L+icToN6eOaJLbPifNr8LY/eqPDc55IvkJhihgJLf0Q:Fn7LyxwHg69obqfVpegwkv+hihcLf0
Static task
static1
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Targets
-
-
Target
29d41c9566739f5371b7e2c1142ffb3c55fe8771d1e4d872d4755ca1f6141f53
-
Size
290KB
-
MD5
882337ff518b678a241e9930c98b14e6
-
SHA1
4cadcd7924e98bab2df7bb3fde737ccce8a6347b
-
SHA256
29d41c9566739f5371b7e2c1142ffb3c55fe8771d1e4d872d4755ca1f6141f53
-
SHA512
21f51aac938e2111f72f576255c133471156bb70f70579d257cd97cb582d6b0a30dca0cdbdfd5349e6c0969a4722eb3b2ecd5d812df08f3fdf860553e9b885e6
-
SSDEEP
3072:mIvn7Ly3sk9L+icToN6eOaJLbPifNr8LY/eqPDc55IvkJhihgJLf0Q:Fn7LyxwHg69obqfVpegwkv+hihcLf0
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-