General

  • Target

    4666c384a4c3443ac704b4fd1311a3c7.exe

  • Size

    300KB

  • Sample

    230316-trwpdsea5x

  • MD5

    4666c384a4c3443ac704b4fd1311a3c7

  • SHA1

    13cda634b73feab1db7e9f021837d3bf3be094eb

  • SHA256

    c30c055cfc659818b2b25a7fe19885a8737f6e513f421a21c1a5eaf72158b02c

  • SHA512

    87e9176ce3926244af2580aadd00d5420266cd026cfd38d0784e01c79d7cb945aa926ab09111ee7b33a38aa31f5ecb65fd74cb1590a86de7b91271fe2c4eb8ef

  • SSDEEP

    3072:lRx2ALdis854nZr2UCPMh6FddAztieF0MjNsvauCaoh8lDaNlf8:nxVL/A4ARddAyMja58

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Targets

    • Target

      4666c384a4c3443ac704b4fd1311a3c7.exe

    • Size

      300KB

    • MD5

      4666c384a4c3443ac704b4fd1311a3c7

    • SHA1

      13cda634b73feab1db7e9f021837d3bf3be094eb

    • SHA256

      c30c055cfc659818b2b25a7fe19885a8737f6e513f421a21c1a5eaf72158b02c

    • SHA512

      87e9176ce3926244af2580aadd00d5420266cd026cfd38d0784e01c79d7cb945aa926ab09111ee7b33a38aa31f5ecb65fd74cb1590a86de7b91271fe2c4eb8ef

    • SSDEEP

      3072:lRx2ALdis854nZr2UCPMh6FddAztieF0MjNsvauCaoh8lDaNlf8:nxVL/A4ARddAyMja58

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks