General
-
Target
203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
-
Size
2.6MB
-
Sample
230910-14lhhsbh96
-
MD5
3f821e69fe1b38097b29ac284016858a
-
SHA1
3995cad76f1313243e5c8abce901876638575341
-
SHA256
203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
-
SHA512
704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
SSDEEP
49152:/oLi8Bd2MIUueEcBY6rCYIvkQIIZB9mnJWUyzD8A04Z/f8I:ALi8B0MiCBbC3IIZB9cKzomZ/kI
Static task
static1
Behavioral task
behavioral1
Sample
203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08.exe
Resource
win7-20230831-en
Malware Config
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Targets
-
-
Target
203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
-
Size
2.6MB
-
MD5
3f821e69fe1b38097b29ac284016858a
-
SHA1
3995cad76f1313243e5c8abce901876638575341
-
SHA256
203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
-
SHA512
704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
SSDEEP
49152:/oLi8Bd2MIUueEcBY6rCYIvkQIIZB9mnJWUyzD8A04Z/f8I:ALi8B0MiCBbC3IIZB9cKzomZ/kI
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-