General

  • Target

    file

  • Size

    174KB

  • Sample

    230316-qkc2xsdc4w

  • MD5

    e58539a5556040a9c415e1cee0a27d7b

  • SHA1

    f6c272d97738f3c9d2258b946857329adda298c2

  • SHA256

    0cfc62e9e3fb70c9319f2b5785dba4a7632b137daf8e0268a557ba9f70e403b3

  • SHA512

    1426c1342e37e29821d3949319c796b14501c0230d388a3060f3f37b56a66074837be82672502e5a1308742199ee57a170366635868cd8b1a889e11f48811eaf

  • SSDEEP

    3072:LosZCJm76T7Q6RL+JLpQskRbM5XVvKLU507hlwtu/XJX:5ZevaLp+A8LUO7hSo

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Targets

    • Target

      file

    • Size

      174KB

    • MD5

      e58539a5556040a9c415e1cee0a27d7b

    • SHA1

      f6c272d97738f3c9d2258b946857329adda298c2

    • SHA256

      0cfc62e9e3fb70c9319f2b5785dba4a7632b137daf8e0268a557ba9f70e403b3

    • SHA512

      1426c1342e37e29821d3949319c796b14501c0230d388a3060f3f37b56a66074837be82672502e5a1308742199ee57a170366635868cd8b1a889e11f48811eaf

    • SSDEEP

      3072:LosZCJm76T7Q6RL+JLpQskRbM5XVvKLU507hlwtu/XJX:5ZevaLp+A8LUO7hSo

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks