General

  • Target

    2852c0eb15c4d3a76ccd8dd1a4a57913.exe

  • Size

    295KB

  • Sample

    230317-r35qbsaf9s

  • MD5

    2852c0eb15c4d3a76ccd8dd1a4a57913

  • SHA1

    a4716be68d566242a2db02ab81a0ab5d36ce4c78

  • SHA256

    8384eb97c0fd7d916cdb454b2212794a8eafa37fe6c7165644d02e8d9bfe5237

  • SHA512

    117005f1dc84b18645597dae20a4957189006b9aff57b36cd9ad2cfb3581552e15bb2bda4554fcd8de2912ff335d1ab2049417fbe15733edc70a022eec7393ac

  • SSDEEP

    3072:IfwRwuLVYWcNymdtYUPW3kiW3GEYJf3ahRnb+k6n6miI3KkdMX:bwuLVZcNdUHoYZqhRqYJkdMX

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Targets

    • Target

      2852c0eb15c4d3a76ccd8dd1a4a57913.exe

    • Size

      295KB

    • MD5

      2852c0eb15c4d3a76ccd8dd1a4a57913

    • SHA1

      a4716be68d566242a2db02ab81a0ab5d36ce4c78

    • SHA256

      8384eb97c0fd7d916cdb454b2212794a8eafa37fe6c7165644d02e8d9bfe5237

    • SHA512

      117005f1dc84b18645597dae20a4957189006b9aff57b36cd9ad2cfb3581552e15bb2bda4554fcd8de2912ff335d1ab2049417fbe15733edc70a022eec7393ac

    • SSDEEP

      3072:IfwRwuLVYWcNymdtYUPW3kiW3GEYJf3ahRnb+k6n6miI3KkdMX:bwuLVZcNdUHoYZqhRqYJkdMX

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks