Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-03-2023 01:30

General

  • Target

    de7320a71b9a0de261be6f7a8d36a6f13c3989681bb98627bc169d0e3f3c76eb.exe

  • Size

    1.9MB

  • MD5

    87b5057f44c2a25338f03f6ba10358ad

  • SHA1

    b8d68c22a48b7b1dabecf2d0cb830392291e3cab

  • SHA256

    de7320a71b9a0de261be6f7a8d36a6f13c3989681bb98627bc169d0e3f3c76eb

  • SHA512

    2c6463eb46b6f2f263beb3601bdf909f7dfb24c4b1b0cb5dd6f19777ae703d7daa84c483e575ffce2792751925668afb6bf4bf0bd2f7e0898f057900eb4b9367

  • SSDEEP

    49152:oM/+7nPk+ae5ce+4E4+OFqG5nYhdB8DrMFm:oM/gPkzeXEORnYhUi

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de7320a71b9a0de261be6f7a8d36a6f13c3989681bb98627bc169d0e3f3c76eb.exe
    "C:\Users\Admin\AppData\Local\Temp\de7320a71b9a0de261be6f7a8d36a6f13c3989681bb98627bc169d0e3f3c76eb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3236
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:4060

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    613.8MB

    MD5

    8ae72b72916e7739ecc68eaca37fe3a0

    SHA1

    b3f5f68bf4a98377a9fe91344aabdefb6a6230e4

    SHA256

    ac519b633a0f5537d4dfd5e86a0f2cad18dd4f504947da06dce3ad274978c0a7

    SHA512

    4049e941960c334815ac5ea82f614bdc82f7fae73c07926f6e2389b2f061e9d309f86b468bff0ef191768955d2e4343dea782cc8d09d0088e9bde2eacbf1db60

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    582.6MB

    MD5

    32cd8ca3a900cd57ed00ee7abd9a3583

    SHA1

    43d89dc81aee924cda94d35ceaf758f73d932f25

    SHA256

    0bfe8b2f4350a0d76890a1706c3155ef525366f72d8291073b0547eb69ac63a2

    SHA512

    9654bea5b3eafe2665187040dfd23647d9291347af2504128c35dafa7df8694d837b595187227c6101c1893c200238409747275dde70100d1cfe3f7f77ecc327

  • memory/3236-118-0x0000000004D10000-0x00000000050E0000-memory.dmp

    Filesize

    3.8MB

  • memory/3236-120-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB

  • memory/3236-121-0x0000000004D10000-0x00000000050E0000-memory.dmp

    Filesize

    3.8MB

  • memory/3236-124-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB

  • memory/4060-130-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB

  • memory/4060-129-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB

  • memory/4060-128-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB

  • memory/4060-131-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB

  • memory/4060-133-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB

  • memory/4060-134-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB

  • memory/4060-135-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB

  • memory/4060-136-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB

  • memory/4060-137-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB

  • memory/4060-138-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB

  • memory/4060-139-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB

  • memory/4060-140-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB

  • memory/4060-141-0x0000000000400000-0x0000000002C97000-memory.dmp

    Filesize

    40.6MB