General

  • Target

    Set-up32Х64bit.exe

  • Size

    906.0MB

  • Sample

    230616-3p2mashc77

  • MD5

    4e3fcd320f3c09ce853af113918939d5

  • SHA1

    de2cb6ccbf2d91b5ffdd1091bab5ec20bb90aa2b

  • SHA256

    18e658ec363968bf44dd6fcc8fb015a34441c346b8c196d0ae320173d48b98d0

  • SHA512

    2f1cd98e4b822acacde9499b89cb0ca194eaee3deb8e1a8c1028d70811356c5ded156966b50c4aeb2489b88c2f88469fdb26a52e6f1920f8cdd38b8abc190ae7

  • SSDEEP

    98304:x0A+OS/5mKctYIWOcNZE5JJKqEDkwhrrm5jMtunv:x0A05zH

Malware Config

Extracted

Family

redline

Botnet

@aboba255

C2

94.142.138.4:80

Attributes
  • auth_value

    6487f4e00b6ec53f5fc436622f366458

Extracted

Family

laplas

C2

http://185.223.93.251

Attributes
  • api_key

    f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7

Targets

    • Target

      Set-up32Х64bit.exe

    • Size

      906.0MB

    • MD5

      4e3fcd320f3c09ce853af113918939d5

    • SHA1

      de2cb6ccbf2d91b5ffdd1091bab5ec20bb90aa2b

    • SHA256

      18e658ec363968bf44dd6fcc8fb015a34441c346b8c196d0ae320173d48b98d0

    • SHA512

      2f1cd98e4b822acacde9499b89cb0ca194eaee3deb8e1a8c1028d70811356c5ded156966b50c4aeb2489b88c2f88469fdb26a52e6f1920f8cdd38b8abc190ae7

    • SSDEEP

      98304:x0A+OS/5mKctYIWOcNZE5JJKqEDkwhrrm5jMtunv:x0A05zH

    • Detects Lobshot family

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Lobshot

      Lobshot is a backdoor module written in c++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks