General

  • Target

    b9e5e40d9f67c2863f5083cd7538045361b90febd90f6be2a7fc04a19c64bde4

  • Size

    1.9MB

  • Sample

    230314-bwxhdacg72

  • MD5

    a6c582180e25a184f93a789d35b24b56

  • SHA1

    5baeb1ff8f56d9e8597fc497a8bdc21e7705d594

  • SHA256

    b9e5e40d9f67c2863f5083cd7538045361b90febd90f6be2a7fc04a19c64bde4

  • SHA512

    039b120db0f3a9dce05f6f86c7d4168df1da569db46caa8d7c22c93e441d611a4ed03455cd6825114dff22d08403097fe143dce06c0c75e1365aa43db273c9a2

  • SSDEEP

    24576:hcI7u0JTd8ZjQue+VnvOYERY1lx4xOoa2UF05he8AfdbtwD6UV69ayIiaOstT2ip:Cmued8VQn+V0Y1L4cGUF0fUIWJSOsVd

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172

Targets

    • Target

      b9e5e40d9f67c2863f5083cd7538045361b90febd90f6be2a7fc04a19c64bde4

    • Size

      1.9MB

    • MD5

      a6c582180e25a184f93a789d35b24b56

    • SHA1

      5baeb1ff8f56d9e8597fc497a8bdc21e7705d594

    • SHA256

      b9e5e40d9f67c2863f5083cd7538045361b90febd90f6be2a7fc04a19c64bde4

    • SHA512

      039b120db0f3a9dce05f6f86c7d4168df1da569db46caa8d7c22c93e441d611a4ed03455cd6825114dff22d08403097fe143dce06c0c75e1365aa43db273c9a2

    • SSDEEP

      24576:hcI7u0JTd8ZjQue+VnvOYERY1lx4xOoa2UF05he8AfdbtwD6UV69ayIiaOstT2ip:Cmued8VQn+V0Y1L4cGUF0fUIWJSOsVd

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks