General

  • Target

    tmp

  • Size

    297KB

  • Sample

    230317-zr1k8sca5t

  • MD5

    bb37b749213479c84b7976511c55d9f4

  • SHA1

    b413e7d55f7efafb6b14c868dfcfbd46fbc480a0

  • SHA256

    507da6dd60f7fdeecbd1286dac0458ce493ecb89eae4b398695e98f0aaaf7082

  • SHA512

    b51d904f4f153ad269ffaff9e191255dfda4af299b74b660ec1feb580b34d35f7203c55b414e25d650805555e60ad84adb201aebcb746948465bf4b5329203c6

  • SSDEEP

    3072:I0+jh1gWLErGGgpTzZqmT+IrLzENoqpF7CD6ywOGXpS2x5dqyz0pwyeitTDnuM:d+rgWLE6GgpT1baxNZ7Wvxyqo0xDnu

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Targets

    • Target

      tmp

    • Size

      297KB

    • MD5

      bb37b749213479c84b7976511c55d9f4

    • SHA1

      b413e7d55f7efafb6b14c868dfcfbd46fbc480a0

    • SHA256

      507da6dd60f7fdeecbd1286dac0458ce493ecb89eae4b398695e98f0aaaf7082

    • SHA512

      b51d904f4f153ad269ffaff9e191255dfda4af299b74b660ec1feb580b34d35f7203c55b414e25d650805555e60ad84adb201aebcb746948465bf4b5329203c6

    • SSDEEP

      3072:I0+jh1gWLErGGgpTzZqmT+IrLzENoqpF7CD6ywOGXpS2x5dqyz0pwyeitTDnuM:d+rgWLE6GgpT1baxNZ7Wvxyqo0xDnu

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Downloads MZ/PE file

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks