General

  • Target

    fd82f497d37d39f0bdc6db9a32f6474d1820327a5de1d8dc1dd0fd7274caace4

  • Size

    296KB

  • Sample

    230317-25t2qaad27

  • MD5

    36f97cccfd413197f98b4943fbdaa875

  • SHA1

    3bb5148f4736e5f4f39807c46ad75b8997e7ce03

  • SHA256

    fd82f497d37d39f0bdc6db9a32f6474d1820327a5de1d8dc1dd0fd7274caace4

  • SHA512

    66171982f19800842def287d2ed0e742f687f4ca492d83111f0b601d0cb179e3a7b70928ef1de2183d7389922b49344fe239306d934dc2f101ce27b1e07b55e8

  • SSDEEP

    6144:4gHLQoCNTP523ANRNKD3xu+X9GmYLwHu:4gHkoCV5CANRNKD3o+w4Hu

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Targets

    • Target

      fd82f497d37d39f0bdc6db9a32f6474d1820327a5de1d8dc1dd0fd7274caace4

    • Size

      296KB

    • MD5

      36f97cccfd413197f98b4943fbdaa875

    • SHA1

      3bb5148f4736e5f4f39807c46ad75b8997e7ce03

    • SHA256

      fd82f497d37d39f0bdc6db9a32f6474d1820327a5de1d8dc1dd0fd7274caace4

    • SHA512

      66171982f19800842def287d2ed0e742f687f4ca492d83111f0b601d0cb179e3a7b70928ef1de2183d7389922b49344fe239306d934dc2f101ce27b1e07b55e8

    • SSDEEP

      6144:4gHLQoCNTP523ANRNKD3xu+X9GmYLwHu:4gHkoCV5CANRNKD3o+w4Hu

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks