General

  • Target

    b273c68306bfba8fe55a39fe29c5a160

  • Size

    1.8MB

  • Sample

    230720-ex3ybscg42

  • MD5

    b273c68306bfba8fe55a39fe29c5a160

  • SHA1

    4f323552f4303b5394680c4f73452ff63a6972cc

  • SHA256

    90a8447971f2150fe9ba03d2680af7bdd33de721e9e1521166a7826ed143a2d8

  • SHA512

    4ae57a98fe732d66061469b3b147f10015cea8d7df640657185133a529332b4eaff0ad9e8854a04ccb6d47aa24fe93350451434a2f75a5824cb1154bcf104d00

  • SSDEEP

    6144:B0TtB357yFQgb8AQ5wDsNXq+2MffwMvrgJngQ8vFr6:B0TtB357GfsN6nMfLcJgQo

Malware Config

Extracted

Family

redline

Botnet

@zerOgr4v1ty

C2

94.142.138.4:80

Attributes
  • auth_value

    20d72d1b5f29f6ee8b5b569f88bdb459

Extracted

Family

laplas

C2

http://185.209.161.189

Attributes
  • api_key

    f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7

Targets

    • Target

      b273c68306bfba8fe55a39fe29c5a160

    • Size

      1.8MB

    • MD5

      b273c68306bfba8fe55a39fe29c5a160

    • SHA1

      4f323552f4303b5394680c4f73452ff63a6972cc

    • SHA256

      90a8447971f2150fe9ba03d2680af7bdd33de721e9e1521166a7826ed143a2d8

    • SHA512

      4ae57a98fe732d66061469b3b147f10015cea8d7df640657185133a529332b4eaff0ad9e8854a04ccb6d47aa24fe93350451434a2f75a5824cb1154bcf104d00

    • SSDEEP

      6144:B0TtB357yFQgb8AQ5wDsNXq+2MffwMvrgJngQ8vFr6:B0TtB357GfsN6nMfLcJgQo

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks