General

  • Target

    file.exe

  • Size

    1.8MB

  • Sample

    230411-he7qcaah89

  • MD5

    288a06e42d98f0624269f33259a8d969

  • SHA1

    c7aeda50137ddb61af5e321d3612f1cbaac6490a

  • SHA256

    fba703c00aa3908fd7bea1806af74aefba3f3657bf52d0f1e87cac54dd0230c4

  • SHA512

    74eaeb0fe58644fa06030468d835178128f8d0df0399549b7d737da5bfcd4123f471341f760fcb0264fde0f7af056aa8b12ebb4137204227df91e741fc79c337

  • SSDEEP

    49152:IBJjYbVrAXDZhV4hkxcJmjKpEybB5TUXhrt8:y9YVrAlf4hkWKnBRri

Malware Config

Extracted

Family

redline

Botnet

test

C2

77.91.85.137:81

Attributes
  • auth_value

    eb42c93b96eea8a95189cf1eeb4f7c0b

Extracted

Family

laplas

C2

http://79.137.199.252

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Targets

    • Target

      file.exe

    • Size

      1.8MB

    • MD5

      288a06e42d98f0624269f33259a8d969

    • SHA1

      c7aeda50137ddb61af5e321d3612f1cbaac6490a

    • SHA256

      fba703c00aa3908fd7bea1806af74aefba3f3657bf52d0f1e87cac54dd0230c4

    • SHA512

      74eaeb0fe58644fa06030468d835178128f8d0df0399549b7d737da5bfcd4123f471341f760fcb0264fde0f7af056aa8b12ebb4137204227df91e741fc79c337

    • SSDEEP

      49152:IBJjYbVrAXDZhV4hkxcJmjKpEybB5TUXhrt8:y9YVrAlf4hkWKnBRri

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks