General

  • Target

    223c077f6eeb0ff32fd5c932f5a4dd311feb4e0156e2d464a6cb9a3645dede90

  • Size

    301KB

  • Sample

    230318-j2pzgsbf64

  • MD5

    3cb930fc50c931ee8d8eb36f9a239fc3

  • SHA1

    dc716aa31de06e05c56718b25a5dda5908963a11

  • SHA256

    223c077f6eeb0ff32fd5c932f5a4dd311feb4e0156e2d464a6cb9a3645dede90

  • SHA512

    e8020f7210d47d4a21bc1d659bfa1f29d875f51ff5264975225b0274520ea83f318498cfbbd5d901cd22dbb80a7bce99a27b1dc3689af994fed9affb25bbb3e0

  • SSDEEP

    3072:PMD/w1LQ/WAY4aJy/vq4oh/JVH7B4RiaNuv/JX580tP+L:Qw1LQeAYbJr4Sp/0uHIw+L

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Targets

    • Target

      223c077f6eeb0ff32fd5c932f5a4dd311feb4e0156e2d464a6cb9a3645dede90

    • Size

      301KB

    • MD5

      3cb930fc50c931ee8d8eb36f9a239fc3

    • SHA1

      dc716aa31de06e05c56718b25a5dda5908963a11

    • SHA256

      223c077f6eeb0ff32fd5c932f5a4dd311feb4e0156e2d464a6cb9a3645dede90

    • SHA512

      e8020f7210d47d4a21bc1d659bfa1f29d875f51ff5264975225b0274520ea83f318498cfbbd5d901cd22dbb80a7bce99a27b1dc3689af994fed9affb25bbb3e0

    • SSDEEP

      3072:PMD/w1LQ/WAY4aJy/vq4oh/JVH7B4RiaNuv/JX580tP+L:Qw1LQeAYbJr4Sp/0uHIw+L

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks