General
-
Target
Installer.exe
-
Size
5.0MB
-
Sample
230324-c2fbqabg25
-
MD5
7f6e6211f715679a559e695cce334801
-
SHA1
6c74f4269d5e5b6fd96b02fd9b0e8d86eae1cab5
-
SHA256
a712edcd797e4f33522d77382e7eae9b55eddaaa753ac33da65af73e0b6e785f
-
SHA512
b0732f3ad124a745952a90ad5df08f67e438bbaf63d2f5a4060d98873a219b8bd4a655089825a5a5f254b57d40c6b194dac77cf1bfe22a15a04cf0ed766943ac
-
SSDEEP
98304:EELNQWOGMWGapFt7G67QI1sbfr30wz93R:EELyWJMWGIgVUuR
Static task
static1
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win7-20230220-en
Malware Config
Extracted
laplas
http://193.233.20.134
-
api_key
57728dce0f7018e17faf9f061cb2d77048e08414376baf6d860b78e74e83c208
Targets
-
-
Target
Installer.exe
-
Size
5.0MB
-
MD5
7f6e6211f715679a559e695cce334801
-
SHA1
6c74f4269d5e5b6fd96b02fd9b0e8d86eae1cab5
-
SHA256
a712edcd797e4f33522d77382e7eae9b55eddaaa753ac33da65af73e0b6e785f
-
SHA512
b0732f3ad124a745952a90ad5df08f67e438bbaf63d2f5a4060d98873a219b8bd4a655089825a5a5f254b57d40c6b194dac77cf1bfe22a15a04cf0ed766943ac
-
SSDEEP
98304:EELNQWOGMWGapFt7G67QI1sbfr30wz93R:EELyWJMWGIgVUuR
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-