MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 de905b4833434a3f8065f6b05b28b0d44465386052f86223fbdacd53b0278986. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LaplasClipper


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: de905b4833434a3f8065f6b05b28b0d44465386052f86223fbdacd53b0278986
SHA3-384 hash: f8eb5a13398a5c073222899806f6a4f568c34783c2ce0813696942bf69ff67efd8e0a82297b3cc94f8b15ad337d7c1d5
SHA1 hash: 080b7829a8c4360502bdd6f40b29f9cbc43445ae
MD5 hash: 734ba2bdb55866a9702295823e3230a4
humanhash: hamper-purple-montana-coffee
File name:734ba2bdb55866a9702295823e3230a4.exe
Download: download sample
Signature LaplasClipper
File size:6'393'000 bytes
First seen:2023-03-04 10:05:21 UTC
Last seen:2023-03-04 11:32:33 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 20fcca9c4f6d6a96b55e9305c9ac59ff (3 x RedLineStealer, 2 x Tofsee, 2 x LaplasClipper)
ssdeep 196608:dkDVQDVkqFkfNiFPeWi6Qk8TwIMYS6NZ326fbN:wsKW2NaVkw7z6NZ3tDN
Threatray 21 similar samples on MalwareBazaar
TLSH T1B65623A313752045E1E2CD388B37BED971F2065ACF81E87DB0EAA5C729729E4C663507
TrID 56.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.1% (.EXE) Win32 Executable (generic) (4505/5/1)
3.7% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:exe LaplasClipper signed

Code Signing Certificate

Organisation:Samsung usa Q32R404FHI RC65R539FHIZCI
Issuer:Samsung usa Q32R404FHI RC65R539FHIZCI
Algorithm:sha1WithRSAEncryption
Valid from:2023-02-25T16:22:15Z
Valid to:2033-02-26T16:22:15Z
Serial number: 542db8a5a19c27ba49dd9a34fee33762
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 95eb3f0526ab69e897cb29a09c65d676be4d88946dffc83bbb6299ad52c51f11
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
abuse_ch
LaplasClipper C2:
111.90.143.136:8268

Intelligence


File Origin
# of uploads :
2
# of downloads :
253
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
734ba2bdb55866a9702295823e3230a4.exe
Verdict:
Malicious activity
Analysis date:
2023-03-04 10:10:49 UTC
Tags:
evasion opendir loader rat redline stealer gcleaner smoke trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Modifying a system file
Replacing files
Sending an HTTP GET request
DNS request
Sending a custom TCP request
Launching a service
Launching a process
Reading critical registry keys
Sending a UDP request
Creating a file
Forced system process termination
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Launching the default Windows debugger (dwwin.exe)
Blocking the Windows Defender launch
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a recently created process
Adding exclusions to Windows Defender
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
autorun greyware overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
PrivateLoader
Verdict:
Malicious
Result
Threat name:
Fabookie, Glupteba, ManusCrypt, Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Downloads files with wrong headers with respect to MIME Content-Type
Found C&C like URL pattern
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies Group Policy settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Fabookie
Yara detected Glupteba
Yara detected ManusCrypt
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 819970 Sample: q8uq6ywFxS.exe Startdate: 04/03/2023 Architecture: WINDOWS Score: 100 133 Snort IDS alert for network traffic 2->133 135 Multi AV Scanner detection for domain / URL 2->135 137 Malicious sample detected (through community Yara rule) 2->137 139 23 other signatures 2->139 8 q8uq6ywFxS.exe 10 52 2->8         started        13 svchost.exe 2->13         started        15 svchost.exe 3 2->15         started        17 9 other processes 2->17 process3 dnsIp4 109 94.142.138.113, 49700, 80 IHOR-ASRU Russian Federation 8->109 111 vk.com 87.240.132.72, 443, 49704, 49705 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 8->111 115 18 other IPs or domains 8->115 83 C:\Users\...\fowc0z7mHKufSCLzYVUAIFc4.exe, PE32 8->83 dropped 85 C:\Users\...\ZfYaOyzuFaJG77hr9f_zk2Be.exe, PE32+ 8->85 dropped 87 C:\Users\...\SBSCRW7xWOwAARxl6wiQWmq8.exe, PE32 8->87 dropped 89 20 other malicious files 8->89 dropped 171 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 8->171 173 May check the online IP address of the machine 8->173 175 Creates HTML files with .exe extension (expired dropper behavior) 8->175 189 4 other signatures 8->189 19 SBSCRW7xWOwAARxl6wiQWmq8.exe 8->19         started        22 0yOPEeLSEOa3nXqQ8pcrfel4.exe 8->22         started        24 9daumfFg5DoGc0INCX9Ds3ay.exe 8->24         started        34 10 other processes 8->34 177 Contains functionality to inject threads in other processes 13->177 179 Contains functionality to inject code into remote processes 13->179 181 Contains functionality to compare user and computer (likely to detect sandboxes) 13->181 183 Contains functionality to detect sleep reduction / modifications 13->183 185 Query firmware table information (likely to detect VMs) 15->185 113 192.168.2.1 unknown unknown 17->113 187 Changes security center settings (notifications, updates, antivirus, firewall) 17->187 28 WerFault.exe 17->28         started        30 WerFault.exe 17->30         started        32 WerFault.exe 17->32         started        file5 signatures6 process7 dnsIp8 65 C:\Windows\Temp\321.exe, PE32 19->65 dropped 67 C:\Windows\Temp\1234.exe, PE32 19->67 dropped 69 C:\Windows\Temp\123.exe, PE32 19->69 dropped 36 1234.exe 19->36         started        39 123.exe 19->39         started        41 321.exe 19->41         started        71 C:\Users\user\AppData\Local\...\is-AC8G4.tmp, PE32 22->71 dropped 45 is-AC8G4.tmp 22->45         started        117 d-rise.cc 24->117 119 104.21.38.123 CLOUDFLARENETUS United States 24->119 125 2 other IPs or domains 24->125 73 C:\Users\user\AppData\Local\...\softokn3.dll, PE32 24->73 dropped 75 C:\Users\user\AppData\Local\Temp\...\nss3.dll, PE32 24->75 dropped 77 C:\Users\user\AppData\Local\...\mozglue.dll, PE32 24->77 dropped 81 3 other malicious files 24->81 dropped 157 Tries to steal Mail credentials (via file / registry access) 24->157 159 Tries to harvest and steal browser information (history, passwords, etc) 24->159 121 telegram.org 149.154.167.99 TELEGRAMRU United Kingdom 34->121 123 23.254.227.202 HOSTWINDSUS United States 34->123 127 6 other IPs or domains 34->127 79 C:\Users\user\AppData\...\svcservice.exe, PE32 34->79 dropped 161 Creates multiple autostart registry keys 34->161 163 Writes to foreign memory regions 34->163 165 Allocates memory in foreign processes 34->165 169 5 other signatures 34->169 47 RegSvcs.exe 34->47         started        49 fowc0z7mHKufSCLzYVUAIFc4.exe 34->49         started        51 LiUYFGTyINTcAGRGYb5Qvvx1.exe 34->51         started        53 WerFault.exe 34->53         started        file9 167 May check the online IP address of the machine 117->167 signatures10 process11 dnsIp12 141 Multi AV Scanner detection for dropped file 36->141 143 Writes to foreign memory regions 36->143 145 Allocates memory in foreign processes 36->145 55 RegSvcs.exe 36->55         started        59 WerFault.exe 36->59         started        147 Injects a PE file into a foreign processes 39->147 61 RegSvcs.exe 39->61         started        63 WerFault.exe 39->63         started        129 127.0.0.1 unknown unknown 41->129 91 C:\Users\user\AppData\...\DownloadMetadata, PDP-11 41->91 dropped 149 Tries to harvest and steal browser information (history, passwords, etc) 41->149 93 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 45->93 dropped 95 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 45->95 dropped 97 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 45->97 dropped 101 7 other files (5 malicious) 45->101 dropped 151 May check the online IP address of the machine 47->151 131 xv.yxzgamen.com 49->131 99 C:\Users\user\AppData\Local\Temp\db.dll, PE32 49->99 dropped file13 signatures14 process15 dnsIp16 103 ip-api.com 208.95.112.1 TUT-ASUS United States 55->103 105 185.139.70.22 SUPERSERVERSDATACENTERRU Russian Federation 55->105 107 2 other IPs or domains 55->107 153 Creates multiple autostart registry keys 55->153 155 Creates an autostart registry key pointing to binary in C:\Windows 55->155 signatures17
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-02-26 23:15:07 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
16 of 39 (41.03%)
Threat level:
  5/5
Result
Malware family:
privateloader
Score:
  10/10
Tags:
family:privateloader loader spyware stealer
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Drops file in System32 directory
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of web browsers
PrivateLoader
Unpacked files
SH256 hash:
05d3ba22a7fe038337cac2beb2681ed193e1d12f78ecf35fa476489981d3b6bd
MD5 hash:
abe5b8cd67a25759398cd7260c524ca0
SHA1 hash:
fe4900dc5bf6cad98f574f2022f50073b806145d
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_a0
SH256 hash:
de905b4833434a3f8065f6b05b28b0d44465386052f86223fbdacd53b0278986
MD5 hash:
734ba2bdb55866a9702295823e3230a4
SHA1 hash:
080b7829a8c4360502bdd6f40b29f9cbc43445ae
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments