General
-
Target
0a862ce47af25310f82df569077085d7.exe
-
Size
2.6MB
-
Sample
230413-y14htadh93
-
MD5
0a862ce47af25310f82df569077085d7
-
SHA1
942ed7ab805c05b4e566156056f50f41c5883aab
-
SHA256
a2ddb2901e7b54c98ad8eb17a8b2a019b344a8c459aa15b29b4fda8962931486
-
SHA512
163996246fd143a651950a9c025b327210178f894e214284c57bf2f3a77699992803e63e5e080621d5840e1cd0155f60649e8a6e00dc5aca696a84948256ea22
-
SSDEEP
49152:u5FxxOfxEu+vX22XptSVBNUd9kPZdBTy1tGnsQt/E4R4jYoj306sBcz2:uxYPElncYkZyMlE4Cjx7scz2
Static task
static1
Behavioral task
behavioral1
Sample
0a862ce47af25310f82df569077085d7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0a862ce47af25310f82df569077085d7.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
laplas
http://79.137.199.252
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Targets
-
-
Target
0a862ce47af25310f82df569077085d7.exe
-
Size
2.6MB
-
MD5
0a862ce47af25310f82df569077085d7
-
SHA1
942ed7ab805c05b4e566156056f50f41c5883aab
-
SHA256
a2ddb2901e7b54c98ad8eb17a8b2a019b344a8c459aa15b29b4fda8962931486
-
SHA512
163996246fd143a651950a9c025b327210178f894e214284c57bf2f3a77699992803e63e5e080621d5840e1cd0155f60649e8a6e00dc5aca696a84948256ea22
-
SSDEEP
49152:u5FxxOfxEu+vX22XptSVBNUd9kPZdBTy1tGnsQt/E4R4jYoj306sBcz2:uxYPElncYkZyMlE4Cjx7scz2
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-