General

  • Target

    788f40e71fe7def232556f15af985c2f9058a0d4a3155548b91b5f46bf04fa92

  • Size

    333KB

  • Sample

    230318-lasmeabg72

  • MD5

    355e5ef847eec83cc3ee16ae14458193

  • SHA1

    9fdaf87c11821aef8eb9e6d2a02cee0410265b7f

  • SHA256

    788f40e71fe7def232556f15af985c2f9058a0d4a3155548b91b5f46bf04fa92

  • SHA512

    e876db75d13147474e12046b51b1396beb31b5838abc9c9f61cc4e13dfab1818283e37ff83b0d52aaeadfef1da8f6949f1025e8564029e22f309ff29124f2ff7

  • SSDEEP

    6144:BUbj1/LNDnlBqT0xUQZZVertj2KRd2PRTQNc/Q:y1/JDnlBqTWcoKX2JTSc/

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Targets

    • Target

      788f40e71fe7def232556f15af985c2f9058a0d4a3155548b91b5f46bf04fa92

    • Size

      333KB

    • MD5

      355e5ef847eec83cc3ee16ae14458193

    • SHA1

      9fdaf87c11821aef8eb9e6d2a02cee0410265b7f

    • SHA256

      788f40e71fe7def232556f15af985c2f9058a0d4a3155548b91b5f46bf04fa92

    • SHA512

      e876db75d13147474e12046b51b1396beb31b5838abc9c9f61cc4e13dfab1818283e37ff83b0d52aaeadfef1da8f6949f1025e8564029e22f309ff29124f2ff7

    • SSDEEP

      6144:BUbj1/LNDnlBqT0xUQZZVertj2KRd2PRTQNc/Q:y1/JDnlBqTWcoKX2JTSc/

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks