General
-
Target
NEAS.f4e1e373d12a061131d533b8648ce880.exe
-
Size
7.0MB
-
Sample
231022-v4szpscf89
-
MD5
f4e1e373d12a061131d533b8648ce880
-
SHA1
a86c8d6f87d2de3767642c735d772e831bdc79db
-
SHA256
fda3a4f1ba51eb0528c406bc94c454e28281d7d3d82c249880659222dc47a754
-
SHA512
12c66ee73500f3254e4cb6425462f502b13f8410c095ee648d52789f48154c3b6a43c9762049bdb196b81d73d5488bbb69fb1266a1a150294164fdd4ae0a7d17
-
SSDEEP
98304:jBFr1GYY6ihQXeuhAgNcpdWK07pWUd/nwdA1GUylyXE6Z2Uk/u0btp6rATIufqWn:1/7kdEQUd/nwu1GY0bToAESaFuv
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f4e1e373d12a061131d533b8648ce880.exe
Resource
win7-20230831-en
Malware Config
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Targets
-
-
Target
NEAS.f4e1e373d12a061131d533b8648ce880.exe
-
Size
7.0MB
-
MD5
f4e1e373d12a061131d533b8648ce880
-
SHA1
a86c8d6f87d2de3767642c735d772e831bdc79db
-
SHA256
fda3a4f1ba51eb0528c406bc94c454e28281d7d3d82c249880659222dc47a754
-
SHA512
12c66ee73500f3254e4cb6425462f502b13f8410c095ee648d52789f48154c3b6a43c9762049bdb196b81d73d5488bbb69fb1266a1a150294164fdd4ae0a7d17
-
SSDEEP
98304:jBFr1GYY6ihQXeuhAgNcpdWK07pWUd/nwdA1GUylyXE6Z2Uk/u0btp6rATIufqWn:1/7kdEQUd/nwu1GY0bToAESaFuv
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-