General

  • Target

    file.exe

  • Size

    2.5MB

  • Sample

    230419-s9xtqsbe77

  • MD5

    913d760e2231966514afd45953222d8d

  • SHA1

    427e0ea23ff895e648dcbdce89d404f671d815ad

  • SHA256

    a361b930ea3e7336d0101bab97323603e1b06c23a42352237ad5272c464d728e

  • SHA512

    bb284b728de9d38d5e8096e6072cab4e6bf9f559aff2a302baf33371cc891adb5a441e45aee3888f2c5b643641fb1fd48489ed8e533b7593d7626653be6ee5b0

  • SSDEEP

    49152:IBJnvmysJFzbwJX/2WjX+/hlnRSf2Eri/ZFydl8wZQkn/M918gW9DTG/utBf5QS8:yJvmys0X/2WIRbEr6ZFyD8w24M91m9DI

Malware Config

Extracted

Family

redline

Botnet

RED

C2

79.137.202.0:81

Attributes
  • auth_value

    49e32ec54afd3f75dadad05dbf2e524f

Extracted

Family

laplas

C2

http://79.137.199.252

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Targets

    • Target

      file.exe

    • Size

      2.5MB

    • MD5

      913d760e2231966514afd45953222d8d

    • SHA1

      427e0ea23ff895e648dcbdce89d404f671d815ad

    • SHA256

      a361b930ea3e7336d0101bab97323603e1b06c23a42352237ad5272c464d728e

    • SHA512

      bb284b728de9d38d5e8096e6072cab4e6bf9f559aff2a302baf33371cc891adb5a441e45aee3888f2c5b643641fb1fd48489ed8e533b7593d7626653be6ee5b0

    • SSDEEP

      49152:IBJnvmysJFzbwJX/2WjX+/hlnRSf2Eri/ZFydl8wZQkn/M918gW9DTG/utBf5QS8:yJvmys0X/2WIRbEr6ZFyD8w24M91m9DI

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks