General
-
Target
4b849d412245437a6185de355d24799911f08df34a5c77e265c6b7222e84337a.bin
-
Size
3.1MB
-
Sample
230501-txem3aee2z
-
MD5
36538f9861e330d5ac9310418f615bf9
-
SHA1
ab32322f5094133b4f75ab10d63a3705cb2064c8
-
SHA256
4b849d412245437a6185de355d24799911f08df34a5c77e265c6b7222e84337a
-
SHA512
9c79444bea20258e71e782ebbdeceb71547f5be54764088f6aba0a0062fce3f8277546bd2f294ae040804196a8e41e99d057449f73d4cbfc4d0213eaa12bdb68
-
SSDEEP
49152:8DOm/UnwYvirEus6NRwMwyfaQb+Tch+kmqk2ls0Oz4HoJ1c0TrBO8THK6aLhlLFq:8xUwiijeMLfRb+Tirdkt0O8Hybrj6HH
Static task
static1
Behavioral task
behavioral1
Sample
4b849d412245437a6185de355d24799911f08df34a5c77e265c6b7222e84337a.exe
Resource
win7-20230220-en
Malware Config
Extracted
laplas
http://45.159.189.33
-
api_key
d1a05de376c0be1daa56dfb2715c8a0c5df8a111b8b31decc886df1e48db7c9c
Targets
-
-
Target
4b849d412245437a6185de355d24799911f08df34a5c77e265c6b7222e84337a.bin
-
Size
3.1MB
-
MD5
36538f9861e330d5ac9310418f615bf9
-
SHA1
ab32322f5094133b4f75ab10d63a3705cb2064c8
-
SHA256
4b849d412245437a6185de355d24799911f08df34a5c77e265c6b7222e84337a
-
SHA512
9c79444bea20258e71e782ebbdeceb71547f5be54764088f6aba0a0062fce3f8277546bd2f294ae040804196a8e41e99d057449f73d4cbfc4d0213eaa12bdb68
-
SSDEEP
49152:8DOm/UnwYvirEus6NRwMwyfaQb+Tch+kmqk2ls0Oz4HoJ1c0TrBO8THK6aLhlLFq:8xUwiijeMLfRb+Tirdkt0O8Hybrj6HH
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-