General
-
Target
539a444f8dff3d9719e36fd9db31b799.bin
-
Size
3.4MB
-
Sample
230616-bp6sgacc34
-
MD5
35a7b4521dae347ecd9c7da76b4e2748
-
SHA1
48555b32234c8146a060807e3e2bdc92b78750c5
-
SHA256
f29d7fe98b8cf7ace554d7a26136ee4504e4634e86336d9225086132774c8238
-
SHA512
26199c69256a79887abcdf5554457de659e29220a0cf22e223d728b2e5a38d03719826287828097d47135f4458283940f3bafc0f9536849de3c724b4753f8a68
-
SSDEEP
49152:v5IboYfA30GfXhdR+WsoB510QySEoLt5JBM7OdO9ohIcfdSBIcgTEQd:v52Y30ChL+/av0QJ5dd4oaOdCIcEEQd
Static task
static1
Behavioral task
behavioral1
Sample
2c5c3ba7eba30cc358b40d494fda79d9d2a6df152bdb7eb1aceb36f3fbcf60c3.exe
Resource
win7-20230220-en
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e
Targets
-
-
Target
2c5c3ba7eba30cc358b40d494fda79d9d2a6df152bdb7eb1aceb36f3fbcf60c3.exe
-
Size
3.5MB
-
MD5
539a444f8dff3d9719e36fd9db31b799
-
SHA1
9b4a836511afdb230888a1e2c0698c839850d8c0
-
SHA256
2c5c3ba7eba30cc358b40d494fda79d9d2a6df152bdb7eb1aceb36f3fbcf60c3
-
SHA512
7c14e97ff23cd34f302658a498e26d694b1d501390536eee51f9e9e2bfc68306b59362d66b7c11d364d2cc7d2e6ed78912b505476e78ae2e928fd859e2c104bd
-
SSDEEP
98304:GrZtcyQgVa9BjWmic5fcD75vuHgdtZgC:GsRgVa9ltc35WHG7
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-