General

  • Target

    729a18396d223d572bc1be314969a0cb5bb_JC.exe

  • Size

    172KB

  • Sample

    230729-n26dpadd4t

  • MD5

    09c157f9647f8b0d434b38d7eadb8b10

  • SHA1

    e93dcdbab46003f7d06914125990874736f659fa

  • SHA256

    729a18396d223d572bc1be314969a0cb5bb01e7dae5c5d1b429ed421c82b1394

  • SHA512

    0987a87aacb2714ff0537dd192c34d3d8145a878acf5fcc81b16cd6f1d1d0eee4a822884aafe91bdb2e8c7cffe9d83a16da0dfb3fd442505d5cad3ed3e653268

  • SSDEEP

    3072:lvnrZuzNeB6ng8mxNky0zWPsGTT8e8hI:lnX6g89JmsGTT

Malware Config

Extracted

Family

redline

Botnet

@LJAGYXA

C2

94.142.138.4:80

Attributes
  • auth_value

    9aec37c9a7a88796e19438759b1463d3

Extracted

Family

laplas

C2

http://185.209.161.189

Attributes
  • api_key

    f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7

Targets

    • Target

      729a18396d223d572bc1be314969a0cb5bb_JC.exe

    • Size

      172KB

    • MD5

      09c157f9647f8b0d434b38d7eadb8b10

    • SHA1

      e93dcdbab46003f7d06914125990874736f659fa

    • SHA256

      729a18396d223d572bc1be314969a0cb5bb01e7dae5c5d1b429ed421c82b1394

    • SHA512

      0987a87aacb2714ff0537dd192c34d3d8145a878acf5fcc81b16cd6f1d1d0eee4a822884aafe91bdb2e8c7cffe9d83a16da0dfb3fd442505d5cad3ed3e653268

    • SSDEEP

      3072:lvnrZuzNeB6ng8mxNky0zWPsGTT8e8hI:lnX6g89JmsGTT

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks