General
-
Target
e64c4823a48781dee7ace0c9d3bba1db753c39527ebb1197eb60f1aeb434965a
-
Size
3.4MB
-
Sample
230621-d5s8esgg5s
-
MD5
ebaa79b733a5e41dadf3e5a6f4aa5c39
-
SHA1
3192cd3251f8edae329e1d4b3b77a6ae4922a7da
-
SHA256
e64c4823a48781dee7ace0c9d3bba1db753c39527ebb1197eb60f1aeb434965a
-
SHA512
0ea80521501a0f9b6a23edaadbc896ac1d5898e968085d2349f78e04a5822010b8e72f73fb4a39e5929ae76497ee8178e711576f5b8cf4a40661a38d3ad7e7b1
-
SSDEEP
98304:C1LbJ2V257D3qX2D1Mmics/vyvXli14lIKWZz+GK:uxoA7rqGD1f7TvXFSKWZ6
Static task
static1
Behavioral task
behavioral1
Sample
e64c4823a48781dee7ace0c9d3bba1db753c39527ebb1197eb60f1aeb434965a.exe
Resource
win7-20230220-en
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79
Targets
-
-
Target
e64c4823a48781dee7ace0c9d3bba1db753c39527ebb1197eb60f1aeb434965a
-
Size
3.4MB
-
MD5
ebaa79b733a5e41dadf3e5a6f4aa5c39
-
SHA1
3192cd3251f8edae329e1d4b3b77a6ae4922a7da
-
SHA256
e64c4823a48781dee7ace0c9d3bba1db753c39527ebb1197eb60f1aeb434965a
-
SHA512
0ea80521501a0f9b6a23edaadbc896ac1d5898e968085d2349f78e04a5822010b8e72f73fb4a39e5929ae76497ee8178e711576f5b8cf4a40661a38d3ad7e7b1
-
SSDEEP
98304:C1LbJ2V257D3qX2D1Mmics/vyvXli14lIKWZz+GK:uxoA7rqGD1f7TvXFSKWZ6
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-