General

  • Target

    6659f84db9582049c250a8343dbf9168.bin

  • Size

    2.8MB

  • Sample

    230727-bpwbqsgg92

  • MD5

    881f48f3f2c607d90bbff8982e1cff1f

  • SHA1

    9124e709a2c43a23e5b22e28034e8e6936556f45

  • SHA256

    28d9b2c50d309ba7c95fb614941744bd8caf13be874117552e443997fd44b339

  • SHA512

    65f53ed07b141feab1278fef3bf53c217576f41a47fa8e9b0a05e4067a1c707fb4dbdf0220d896cddb5cd4495dc8d37ad0efc7fb36f408284969dd837e8a18a3

  • SSDEEP

    49152:CmCkYGdKorgUT16P/RS5U3e1ho37R36L/pgSaQGzwekAzZgZa/rBIKIveYBPC:6kYGdKyxsP137RKLBeQG8eFRtIKIvfBq

Malware Config

Extracted

Family

redline

Botnet

250723_rc_11

C2

rcam25.tuktuk.ug:11290

Attributes
  • auth_value

    e4d5022e8271228547a5ac6b68c29a07

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Targets

    • Target

      1ed33d760f151b33b3d20bf9e6d0b722fe39cbd302ecebb5c6e3d0ee09e4ee05.exe

    • Size

      2.8MB

    • MD5

      6659f84db9582049c250a8343dbf9168

    • SHA1

      e58b0d6a289be0a12f20587cf8945233a086a27e

    • SHA256

      1ed33d760f151b33b3d20bf9e6d0b722fe39cbd302ecebb5c6e3d0ee09e4ee05

    • SHA512

      f9c54bd609dd78d182652892747b22db4064401dc420677f0f79e93b8504b6b4a1c92dd08d32cd4362b9973a9f7dc577b753b15f0d543b9449f64d41d652607c

    • SSDEEP

      49152:4K9pTJqY0xorwlsQRXh9e3rcpadXRZCq3PPK5/AQEiNT18Nnb+vE:4KLvZrAjX/rdlpLk+8

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks