General
-
Target
8ee319a68644628af5df86add9dc87cd.bin
-
Size
168KB
-
Sample
230319-wlcqfahe32
-
MD5
d3dc7f602b287e072f47c74b69c89aea
-
SHA1
0afaf7fbbc6ea0793d8a89f6dabf80900111cb96
-
SHA256
e6500667f8524005c7fe12435e0130ffc30efb21b81d7682d2567c041525aa23
-
SHA512
b60d1a3f19bde3126ad6e753082f4c5d1df51aa7833498a7bcc1c256c37f595a51ed4e972b3592306ec46f2579897111254dc944cd182e6d23d95c263fde2fff
-
SSDEEP
3072:VxpuayAgcKbu09XiWx27vLimnwPwH8HjlEoF1aBsSMKMXfINt0:ludHcKbn9wihP7HjlE4waSMKMXf+m
Static task
static1
Behavioral task
behavioral1
Sample
ccd1cde08e07f3be31008ea2b7ace4190317f179c3a75e0b9e88670aa70626cb.exe
Resource
win7-20230220-en
Malware Config
Extracted
laplas
http://45.87.154.105
-
api_key
1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767
Targets
-
-
Target
ccd1cde08e07f3be31008ea2b7ace4190317f179c3a75e0b9e88670aa70626cb.exe
-
Size
296KB
-
MD5
8ee319a68644628af5df86add9dc87cd
-
SHA1
e04fd5d186041e8423c0407ca3d2b844f2123c32
-
SHA256
ccd1cde08e07f3be31008ea2b7ace4190317f179c3a75e0b9e88670aa70626cb
-
SHA512
cbdf160308a8c1d9a78e0f2c8dadf7e65661e9d564497e17c92be1ab7423ad5db256166180285074b9843add81648d20ff2438f44ba69990195a48f6a376a6a6
-
SSDEEP
3072:Z0kKKgML7DG7uJAj7VDpo18Ur4+f6trQ2KmknjpBv8sVHI4yjitchauM:imgML7C7uJo7/+f6G2K7jpBv8Gupcu
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-