MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 654bf06299096148fb1456dd29d44ed0c8eab6add7ad3770f332e5d2e922c126. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LaplasClipper


Vendor detections: 17


Intelligence 17 IOCs YARA File information Comments

SHA256 hash: 654bf06299096148fb1456dd29d44ed0c8eab6add7ad3770f332e5d2e922c126
SHA3-384 hash: 2d732f89e1c42104bbad2391e449b2f2a463f863a19eeb7632b9eee5954316fa9656a158bdb061ac6596de92d449d8d5
SHA1 hash: 8c51087557f0ce83d787b2e14b239388c9ec074e
MD5 hash: 1f69ccc621bab240c30b0e85c0038e54
humanhash: angel-april-alpha-ten
File name:1f69ccc621bab240c30b0e85c0038e54.exe
Download: download sample
Signature LaplasClipper
File size:303'616 bytes
First seen:2023-03-31 15:56:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b5c61aba16184424375bfa94bcd70155 (7 x Smoke Loader, 2 x RedLineStealer, 2 x Amadey)
ssdeep 3072:VdQ1VDfwIPN9Re4kKXVe8MY0TYYQ38qTzkcN1fcDZJcxCZOPH4TXWvQfu:fqrPN9wKXVHLT4yKJcxCUH2
Threatray 4'269 similar samples on MalwareBazaar
TLSH T15C546C026EE07861F52F46728E2EC6F46B1EBC61DD557B5E1278EE3F09B12B1C262701
TrID 37.3% (.EXE) Win64 Executable (generic) (10523/12/4)
17.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
16.0% (.EXE) Win32 Executable (generic) (4505/5/1)
7.3% (.ICL) Windows Icons Library (generic) (2059/9)
7.2% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 0141210111203101 (1 x LaplasClipper)
Reporter abuse_ch
Tags:exe LaplasClipper

Intelligence


File Origin
# of uploads :
1
# of downloads :
267
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
1f69ccc621bab240c30b0e85c0038e54.exe
Verdict:
Malicious activity
Analysis date:
2023-03-31 15:59:05 UTC
Tags:
loader smoke trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for synchronization primitives
Sending a custom TCP request
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP POST request
Reading critical registry keys
Creating a process from a recently created file
Query of malicious DNS domain
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
azorult crypter greyware mokes packed redline smokeloader tofsee zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RedLine, SmokeLoader
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 838913 Sample: WhFimxsXlX.exe Startdate: 31/03/2023 Architecture: WINDOWS Score: 100 51 Snort IDS alert for network traffic 2->51 53 Multi AV Scanner detection for domain / URL 2->53 55 Malicious sample detected (through community Yara rule) 2->55 57 7 other signatures 2->57 7 WhFimxsXlX.exe 2->7         started        10 hehahib 2->10         started        12 8918.exe 2->12         started        process3 signatures4 71 Detected unpacking (changes PE section rights) 7->71 73 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 7->73 75 Maps a DLL or memory area into another process 7->75 77 Creates a thread in another existing process (thread injection) 7->77 14 explorer.exe 7 7->14 injected 79 Multi AV Scanner detection for dropped file 10->79 81 Machine Learning detection for dropped file 10->81 83 Checks if the current machine is a virtual machine (disk enumeration) 10->83 process5 dnsIp6 37 189.168.116.62, 49704, 49705, 49706 UninetSAdeCVMX Mexico 14->37 39 211.59.14.90, 49715, 49733, 49738 SKB-ASSKBroadbandCoLtdKR Korea Republic of 14->39 41 6 other IPs or domains 14->41 25 C:\Users\user\AppData\Roaming\hehahib, PE32 14->25 dropped 27 C:\Users\user\AppData\Local\Temp\8918.exe, PE32 14->27 dropped 29 C:\Users\user\AppData\Local\Temp\43E8.exe, PE32 14->29 dropped 31 C:\Users\user\...\hehahib:Zone.Identifier, ASCII 14->31 dropped 43 System process connects to network (likely due to code injection or exploit) 14->43 45 Benign windows process drops PE files 14->45 47 Deletes itself after installation 14->47 49 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->49 19 43E8.exe 15 4 14->19         started        23 8918.exe 14->23         started        file7 signatures8 process9 dnsIp10 33 francestracking.com 185.251.91.223, 49721, 80 SPRINTHOSTRU Russian Federation 19->33 35 api.ip.sb 19->35 59 Detected unpacking (changes PE section rights) 19->59 61 Detected unpacking (overwrites its own PE header) 19->61 63 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->63 69 2 other signatures 19->69 65 Multi AV Scanner detection for dropped file 23->65 67 Machine Learning detection for dropped file 23->67 signatures11
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2023-03-28 19:22:28 UTC
File Type:
PE (Exe)
Extracted files:
57
AV detection:
29 of 36 (80.56%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:redline family:smokeloader botnet:frtrack botnet:pub1 backdoor discovery infostealer spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Checks installed software on the system
Executes dropped EXE
Reads user/profile data of web browsers
Downloads MZ/PE file
RedLine
RedLine payload
SmokeLoader
Malware Config
C2 Extraction:
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
francestracking.com:80
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments