General
-
Target
7b4a2a3b79f2550149cda6141c9fcbba.bin
-
Size
167KB
-
Sample
230319-wk12mshe25
-
MD5
07eca907998abbe575f0c80dc9f7616e
-
SHA1
cafa48c85bfeff3d2fd7e67734f5189a6962dd0c
-
SHA256
b0686b9a7a55460858c8d8392d029218a724e363ea798ecb46304bce55710919
-
SHA512
858d357c77a3141a44e171a5ee01cf3df6f7075a4976ea8cbae30b4c015a7ee10d6ec4f58cdb2ecb58f71157ae6a54541742cd6c9e859f9e707abd94afeb93e0
-
SSDEEP
3072:P1hGFKFs72aMmDdpqgfMXybyHSIQP9XRyQS/vG0DT5AsjPlM/0JHoz9Q:PXaKFs72sD1yHBQP9XRyB/n9Asj2/0WG
Static task
static1
Behavioral task
behavioral1
Sample
61574da5a4ce85b7e4ab4456a7cc4410c281a1fa6e4144b8be7f6d0b7679fbcd.exe
Resource
win7-20230220-en
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Targets
-
-
Target
61574da5a4ce85b7e4ab4456a7cc4410c281a1fa6e4144b8be7f6d0b7679fbcd.exe
-
Size
296KB
-
MD5
7b4a2a3b79f2550149cda6141c9fcbba
-
SHA1
ce4641a31e538ea05a53574de2c12d5ab2cf580d
-
SHA256
61574da5a4ce85b7e4ab4456a7cc4410c281a1fa6e4144b8be7f6d0b7679fbcd
-
SHA512
9bc54e51bc6ac30b257ed0ca8820e12adb7abe3c88c958990bb702bbbb2694690e67757af3546e6f0c358bbf5784fc45b6a3f149aa2f3d1b7a6119aeaeefbaf3
-
SSDEEP
6144:GcwSLJmySBx5DhTkxjgN1pOnaloCtDnu:jwSFmykPFgxjgNIqnu
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-