General

  • Target

    tmp

  • Size

    290KB

  • Sample

    230319-qlpr4sge42

  • MD5

    e681980e0fe13cc6b03d145f993f6d57

  • SHA1

    55c90ca0e3558e3227980cc1c083e14694c7b3f7

  • SHA256

    6eca42031f2809aca73b3cc3296cde7d49852f2ed14985c3093c10244d22376d

  • SHA512

    c2d6bef9ce2782ce7cd2f657773ac69ccb8bf5ea32cfd2cc7bdaa42df1334d784bef52286025294ea6220a41c8de51e6a938110ae573f14ec761d09a36578917

  • SSDEEP

    6144:gNnHLcUZsHVqxCpKbz+44XfQvW5xRPvPhO:gNnHAUSwJb64A5HHPh

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Targets

    • Target

      tmp

    • Size

      290KB

    • MD5

      e681980e0fe13cc6b03d145f993f6d57

    • SHA1

      55c90ca0e3558e3227980cc1c083e14694c7b3f7

    • SHA256

      6eca42031f2809aca73b3cc3296cde7d49852f2ed14985c3093c10244d22376d

    • SHA512

      c2d6bef9ce2782ce7cd2f657773ac69ccb8bf5ea32cfd2cc7bdaa42df1334d784bef52286025294ea6220a41c8de51e6a938110ae573f14ec761d09a36578917

    • SSDEEP

      6144:gNnHLcUZsHVqxCpKbz+44XfQvW5xRPvPhO:gNnHAUSwJb64A5HHPh

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks