General

  • Target

    efd930a05e3497d82dec3bf394060900c09945105250b2207326f396bc921ea9

  • Size

    291KB

  • Sample

    230318-qykc6aee2v

  • MD5

    3b3aed60d330c39e582230b682ff2156

  • SHA1

    b91132e4edd5f9a02391dd8b5e25b64e68a73b8a

  • SHA256

    efd930a05e3497d82dec3bf394060900c09945105250b2207326f396bc921ea9

  • SHA512

    81e486b6ae35699a86e7d51bebc2cb314e72c33834e03ab059864befe5e8182ec4f06bdaaf1a1a92eae687cf26d6a0f9af720710caf869fbb5e6590cb1c2ed3a

  • SSDEEP

    3072:/PKXgwL0oG5+1hTI1ca9Y924EbWJaA1SNx75MVtNpkcWK:EgwL055+A1ca9S+GaAQN4B2cWK

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Targets

    • Target

      efd930a05e3497d82dec3bf394060900c09945105250b2207326f396bc921ea9

    • Size

      291KB

    • MD5

      3b3aed60d330c39e582230b682ff2156

    • SHA1

      b91132e4edd5f9a02391dd8b5e25b64e68a73b8a

    • SHA256

      efd930a05e3497d82dec3bf394060900c09945105250b2207326f396bc921ea9

    • SHA512

      81e486b6ae35699a86e7d51bebc2cb314e72c33834e03ab059864befe5e8182ec4f06bdaaf1a1a92eae687cf26d6a0f9af720710caf869fbb5e6590cb1c2ed3a

    • SSDEEP

      3072:/PKXgwL0oG5+1hTI1ca9Y924EbWJaA1SNx75MVtNpkcWK:EgwL055+A1ca9S+GaAQN4B2cWK

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks