MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7f167b28d9c7abdc22f28b869ff375d421d6bbe12ccbc8299d16d4fbea022315. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LaplasClipper


Vendor detections: 14


Intelligence 14 IOCs YARA 8 File information Comments

SHA256 hash: 7f167b28d9c7abdc22f28b869ff375d421d6bbe12ccbc8299d16d4fbea022315
SHA3-384 hash: 3bed668e0a733b297f5d351d9d532e9dd0d38f6c6859ddb23876d084cb94fbb63fa7bf6b3680bb9e09d675b06bcfb5dc
SHA1 hash: 08203769381e9b2593cb4dc525f4bf166892abc5
MD5 hash: 71a0ca15307459ac022cc94745b4e4d6
humanhash: georgia-bacon-papa-lion
File name:71a0ca15307459ac022cc94745b4e4d6.exe
Download: download sample
Signature LaplasClipper
File size:2'684'811 bytes
First seen:2023-04-17 05:25:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 12e12319f1029ec4f8fcbed7e82df162 (388 x DCRat, 52 x RedLineStealer, 51 x Formbook)
ssdeep 49152:IBJ+lPvy/ydUPzMTwt5whOO0BaRPu/TBHXCzjXSZfofdZo6qNx:yMlo1YD+aRPoTB38jlfdZo/Nx
TLSH T1F5C52351F6C284F1C272587A55752B21AA3DBC212FB64EDF6780232EAC315D2DB30B76
TrID 89.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.5% (.EXE) Win64 Executable (generic) (10523/12/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter abuse_ch
Tags:exe LaplasClipper


Avatar
abuse_ch
LaplasClipper C2:
77.91.85.137:21969

Intelligence


File Origin
# of uploads :
1
# of downloads :
283
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-04-17 02:25:38 UTC
Tags:
installer loader stealer rat redline opendir cryptbot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Launching a process
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm greyware overlay packed packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
MinerDownloader, Laplas Clipper, RedLine
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Encrypted powershell cmdline option found
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses process hollowing technique
Sigma detected: Schedule system process
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic MinerDownloader
Yara detected Laplas Clipper
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 847898 Sample: diPn9EJeRS.exe Startdate: 17/04/2023 Architecture: WINDOWS Score: 100 99 Snort IDS alert for network traffic 2->99 101 Found malware configuration 2->101 103 Malicious sample detected (through community Yara rule) 2->103 105 14 other signatures 2->105 11 diPn9EJeRS.exe 11 2->11         started        14 svcservice.exe 2->14         started        16 svcservice.exe 2->16         started        process3 file4 75 C:\Users\user\AppData\Local\...\Mahatga3.exe, PE32 11->75 dropped 77 C:\Users\user\AppData\Local\...\Mahatga2.exe, PE32 11->77 dropped 79 C:\Users\user\AppData\Local\...\Mahatga.exe, PE32 11->79 dropped 18 Mahatga2.exe 1 11->18         started        21 Mahatga.exe 1 11->21         started        23 Mahatga3.exe 11->23         started        process5 file6 107 Multi AV Scanner detection for dropped file 18->107 109 Machine Learning detection for dropped file 18->109 111 Writes to foreign memory regions 18->111 113 Sample uses process hollowing technique 18->113 26 AppLaunch.exe 1 18->26         started        29 conhost.exe 18->29         started        31 AppLaunch.exe 18->31         started        42 2 other processes 18->42 115 Allocates memory in foreign processes 21->115 117 Injects a PE file into a foreign processes 21->117 33 AppLaunch.exe 4 21->33         started        36 WerFault.exe 23 9 21->36         started        38 conhost.exe 21->38         started        73 C:\Users\user\AppData\...\svcservice.exe, PE32 23->73 dropped 119 Antivirus detection for dropped file 23->119 40 svcservice.exe 23->40         started        signatures7 process8 dnsIp9 125 Injects a PE file into a foreign processes 26->125 44 AppLaunch.exe 26->44         started        49 conhost.exe 26->49         started        89 77.91.85.137, 21969, 49707 METREX-ASRU Russian Federation 33->89 127 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 33->127 129 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 33->129 131 Tries to harvest and steal browser information (history, passwords, etc) 33->131 133 Tries to steal Crypto Currency Wallets 33->133 91 79.137.199.252, 49710, 49711, 49712 PSKSET-ASRU Russian Federation 40->91 135 Antivirus detection for dropped file 40->135 signatures10 process11 dnsIp12 93 github.com 140.82.121.4, 443, 49701, 49702 GITHUBUS United States 44->93 95 raw.githubusercontent.com 185.199.109.133, 443, 49703, 49705 FASTLYUS Netherlands 44->95 97 pastebin.com 172.67.34.170, 443, 49700 CLOUDFLARENETUS United States 44->97 81 C:\ProgramData\Dllhost\winlogson.exe, PE32+ 44->81 dropped 83 C:\ProgramData\Dllhost\dllhost.exe, PE32 44->83 dropped 85 C:\ProgramData\Dllhost\WinRing0x64.sys, PE32+ 44->85 dropped 87 C:\ProgramData\HostData\logs.uce, ASCII 44->87 dropped 139 Sample is not signed and drops a device driver 44->139 51 cmd.exe 44->51         started        54 cmd.exe 44->54         started        56 cmd.exe 44->56         started        file13 signatures14 process15 signatures16 121 Encrypted powershell cmdline option found 51->121 123 Uses schtasks.exe or at.exe to add and modify task schedules 51->123 58 powershell.exe 51->58         started        61 conhost.exe 51->61         started        63 conhost.exe 54->63         started        65 schtasks.exe 54->65         started        67 conhost.exe 56->67         started        69 schtasks.exe 56->69         started        process17 signatures18 137 Query firmware table information (likely to detect VMs) 58->137 71 wermgr.exe 58->71         started        process19
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2023-04-17 01:33:57 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:laplas clipper persistence spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Laplas Clipper
Malware Config
C2 Extraction:
http://79.137.199.252
Unpacked files
SH256 hash:
809fcc3829dc792813ea69f7d81439f86a3a0ba44b23ad610305e329806b0fb2
MD5 hash:
767273e877d888963d693b3bb04d87c9
SHA1 hash:
7f484a83713c396d74142065346db3854b56f5ff
SH256 hash:
2069aeaee0b8567eda83bb0c3a8f1fc6a36f044593fa4b1828b8aef3e2b96353
MD5 hash:
70757257c6cb58e031afdc507b0d739c
SHA1 hash:
a4d737ab26dc85942273def18e1f294c8b2ab6e2
SH256 hash:
00339fde2116b4e602eaa47cd3d900829238d3e83d3e81f53d9f62cb4a6cea30
MD5 hash:
0dc31bc41bc29c52800350c1f4addf30
SHA1 hash:
42a19afb7f736c3d31d9bd4c9810d862fe383e74
SH256 hash:
1584a614fcea5c30b8e9616838aebd7cfb4363db87ce4e678bccd8bfa1a9698c
MD5 hash:
fc2b45ac98b9e908bdb75b9ca0c3e67b
SHA1 hash:
b8a36b86d11420d35b7f7ad4e4c39ed96fa815f7
SH256 hash:
7f167b28d9c7abdc22f28b869ff375d421d6bbe12ccbc8299d16d4fbea022315
MD5 hash:
71a0ca15307459ac022cc94745b4e4d6
SHA1 hash:
08203769381e9b2593cb4dc525f4bf166892abc5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:INDICATOR_SUSPICIOUS_EXE_RawPaste_URL
Author:ditekSHen
Description:Detects executables (downlaoders) containing URLs to raw contents of a paste
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:pe_imphash
Rule name:sfx_pdb
Author:@razvialex
Description:Detect interesting files containing sfx with pdb paths.
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:XWorm_Hunter
Author:Potato

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments