General
-
Target
auto.exe
-
Size
4.3MB
-
Sample
230507-ghmnxadh59
-
MD5
ddac8c4023deb11c8640fca3c9313113
-
SHA1
396f984beea94dd6f1e59218cacfff3836ee8521
-
SHA256
fd1b90ab20f012a6132f7f059f73032b279739f29217e331b947c984a4172b05
-
SHA512
2fb5f51ce4ac4494d4811207c6ba29fd1a1d8b1a2e52771f5567fbb37bc71d8e5b2b8f349bfccd87e91f4d28b9cff10f6b3e134dc98de62faab92b1eab2f1280
-
SSDEEP
98304:lAyd60OW0mP1Q6Ul5ZTeDWsAL3Kc3SLcxIVbYzR0nP6QdB8:Cf051lUXUDMKcCL0Eb4R
Static task
static1
Behavioral task
behavioral1
Sample
auto.exe
Resource
win7-20230220-en
Malware Config
Extracted
laplas
http://185.209.161.89
-
api_key
6a2714906f1325d666e4cf9f6269c2352ccfb7e7f1a23c114287dc69ddf27cb0
Targets
-
-
Target
auto.exe
-
Size
4.3MB
-
MD5
ddac8c4023deb11c8640fca3c9313113
-
SHA1
396f984beea94dd6f1e59218cacfff3836ee8521
-
SHA256
fd1b90ab20f012a6132f7f059f73032b279739f29217e331b947c984a4172b05
-
SHA512
2fb5f51ce4ac4494d4811207c6ba29fd1a1d8b1a2e52771f5567fbb37bc71d8e5b2b8f349bfccd87e91f4d28b9cff10f6b3e134dc98de62faab92b1eab2f1280
-
SSDEEP
98304:lAyd60OW0mP1Q6Ul5ZTeDWsAL3Kc3SLcxIVbYzR0nP6QdB8:Cf051lUXUDMKcCL0Eb4R
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-