General

  • Target

    redlineStealer1.zip

  • Size

    4.5MB

  • Sample

    221201-tftqnahe5v

  • MD5

    11b57deafaec4e0f53361519d2c61fcb

  • SHA1

    68725139898a03bbb083aa804787adc697a7cc29

  • SHA256

    c66f14eccd510a623bd2df228b9ed8f8c6216d7c61114f8934055887f3dd257f

  • SHA512

    7b441706257d603d47e767abcc147c7e63ba78d19e4d4a708d9d327b66e9e05893fcae2c8d1cc5cc40cc01a2605c208d9fba0512ace40c57363e7334f42f3594

  • SSDEEP

    98304:vtjVwbijsC/EPkcZJvegPfWCrG3aSOPnHwIdVkARxOdEJ14t:h+ujsvlHWCq3ovHwGVJRL1o

Malware Config

Extracted

Family

laplas

C2

185.213.208.247

Attributes
  • api_key

    f21073add21558dbf805f2d7f01a9192d88f14e6896a394396e1cd41f3a1c26b

Targets

    • Target

      redlineStealer1.exe

    • Size

      4.6MB

    • MD5

      40f7448691c80ea2483d44d84b1f7d02

    • SHA1

      7f572aad898afb99ef6082280d5190deb954c886

    • SHA256

      80edb77e7473d68393b70416a3563b9743e25e0a4b85375ac642e2bfdf0380ef

    • SHA512

      4820979e439ff09ba47f1286d09f2c9513bb62fcfb309364b5707b7868ce226661a0f02e36c76cf8ce8308c95d9c46c01c53076fbcd4ecb1c28e5d7490eb5a67

    • SSDEEP

      98304:5Fjrg3ipseLuX6aBLdeQZfKA3c3uiAPnJS2fnEAnzMJq3xo:PUypsDT5KAM3kvJSinpnhx

    • Laplas Clipper

      Laplas is a crypto wallet stealer with two variants written in Golang and C#.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks