General
-
Target
9f35ecf414df4f8e3d0bfa41cea9ebf0827a271941555cabaf22530d774bd999
-
Size
2.7MB
-
Sample
230507-fsalnacd21
-
MD5
20974e780438e87cf0fab2e4c10aa72a
-
SHA1
577e4d37c6897e550abe430d58577b595ed6d2a9
-
SHA256
9f35ecf414df4f8e3d0bfa41cea9ebf0827a271941555cabaf22530d774bd999
-
SHA512
c40c222c127d002ea647f3a447426099c7e20f2c9cee48d60f626222e27123406f18e84a2e0774f1725dde001691525487f37e753c5c1dd026b84c958d017e61
-
SSDEEP
49152:izUKp+KxzGMns8LyGuD7wdwrYvihsZqkWo9pG7XnkMcfWzE65Gl9R/4xEozse:iYKpbxZDyGuDkdRiOZRd9e5KW4aGd/6N
Static task
static1
Behavioral task
behavioral1
Sample
9f35ecf414df4f8e3d0bfa41cea9ebf0827a271941555cabaf22530d774bd999.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9f35ecf414df4f8e3d0bfa41cea9ebf0827a271941555cabaf22530d774bd999.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e
Targets
-
-
Target
9f35ecf414df4f8e3d0bfa41cea9ebf0827a271941555cabaf22530d774bd999
-
Size
2.7MB
-
MD5
20974e780438e87cf0fab2e4c10aa72a
-
SHA1
577e4d37c6897e550abe430d58577b595ed6d2a9
-
SHA256
9f35ecf414df4f8e3d0bfa41cea9ebf0827a271941555cabaf22530d774bd999
-
SHA512
c40c222c127d002ea647f3a447426099c7e20f2c9cee48d60f626222e27123406f18e84a2e0774f1725dde001691525487f37e753c5c1dd026b84c958d017e61
-
SSDEEP
49152:izUKp+KxzGMns8LyGuD7wdwrYvihsZqkWo9pG7XnkMcfWzE65Gl9R/4xEozse:iYKpbxZDyGuDkdRiOZRd9e5KW4aGd/6N
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-