General

  • Target

    a46844ca8aac1630877f85b10245c97334de38a93f4a9aa722d287d5316c16c5

  • Size

    295KB

  • Sample

    230317-q6tlssge72

  • MD5

    b19c24870f768fcafbfe739c96f1566f

  • SHA1

    5a7980d34ae16188c3ffc02660b26f74713107ac

  • SHA256

    a46844ca8aac1630877f85b10245c97334de38a93f4a9aa722d287d5316c16c5

  • SHA512

    e961d877265bb04659db46f454b6ec670607d3814cee8ac988aef66badb8facb565f2894f82b0783e9cd7ff589088cc1386245410fffc97b25db36e033bf68bf

  • SSDEEP

    3072:F1dwdLGFWfBBF/2OPyUbrieCljINBTq0jiv6LWziI3T:dwdLGkfBb/2obrjIeBTqdPP

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Targets

    • Target

      a46844ca8aac1630877f85b10245c97334de38a93f4a9aa722d287d5316c16c5

    • Size

      295KB

    • MD5

      b19c24870f768fcafbfe739c96f1566f

    • SHA1

      5a7980d34ae16188c3ffc02660b26f74713107ac

    • SHA256

      a46844ca8aac1630877f85b10245c97334de38a93f4a9aa722d287d5316c16c5

    • SHA512

      e961d877265bb04659db46f454b6ec670607d3814cee8ac988aef66badb8facb565f2894f82b0783e9cd7ff589088cc1386245410fffc97b25db36e033bf68bf

    • SSDEEP

      3072:F1dwdLGFWfBBF/2OPyUbrieCljINBTq0jiv6LWziI3T:dwdLGkfBb/2obrjIeBTqdPP

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks