General

  • Target

    46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1

  • Size

    2.6MB

  • Sample

    230709-31wkesgc65

  • MD5

    65482e3a11dff25a26f8b9667999ae5f

  • SHA1

    967455baa933e5122008db83ebf0f0be29d8afa1

  • SHA256

    46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1

  • SHA512

    d4475480c623ddf2a648977af78548470a56e115990018fc91b354b939949a36f7dd84822d4dee54c3a9df690b4d70deef43eb55420f38fe9186a9d26fd1c6b3

  • SSDEEP

    49152:DLZTeIJtQrmRw7mGRPsIbGHH04cmjloa2TouNMjTuyRQeWhKIjAkSt80rY:D5IrmRwKGSTHtjWa2cbTuySeWhKCSvY

Malware Config

Extracted

Family

redline

Botnet

090723_rc_11

C2

rcam.tuktuk.ug:11290

Attributes
  • auth_value

    abd581cdd66d51ad306682319cafa5a0

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Targets

    • Target

      46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1

    • Size

      2.6MB

    • MD5

      65482e3a11dff25a26f8b9667999ae5f

    • SHA1

      967455baa933e5122008db83ebf0f0be29d8afa1

    • SHA256

      46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1

    • SHA512

      d4475480c623ddf2a648977af78548470a56e115990018fc91b354b939949a36f7dd84822d4dee54c3a9df690b4d70deef43eb55420f38fe9186a9d26fd1c6b3

    • SSDEEP

      49152:DLZTeIJtQrmRw7mGRPsIbGHH04cmjloa2TouNMjTuyRQeWhKIjAkSt80rY:D5IrmRwKGSTHtjWa2cbTuySeWhKCSvY

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks