General

  • Target

    29d41c9566739f5371b7e2c1142ffb3c55fe8771d1e4d872d4755ca1f6141f53

  • Size

    290KB

  • Sample

    230319-r7rz2agg77

  • MD5

    882337ff518b678a241e9930c98b14e6

  • SHA1

    4cadcd7924e98bab2df7bb3fde737ccce8a6347b

  • SHA256

    29d41c9566739f5371b7e2c1142ffb3c55fe8771d1e4d872d4755ca1f6141f53

  • SHA512

    21f51aac938e2111f72f576255c133471156bb70f70579d257cd97cb582d6b0a30dca0cdbdfd5349e6c0969a4722eb3b2ecd5d812df08f3fdf860553e9b885e6

  • SSDEEP

    3072:mIvn7Ly3sk9L+icToN6eOaJLbPifNr8LY/eqPDc55IvkJhihgJLf0Q:Fn7LyxwHg69obqfVpegwkv+hihcLf0

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Targets

    • Target

      29d41c9566739f5371b7e2c1142ffb3c55fe8771d1e4d872d4755ca1f6141f53

    • Size

      290KB

    • MD5

      882337ff518b678a241e9930c98b14e6

    • SHA1

      4cadcd7924e98bab2df7bb3fde737ccce8a6347b

    • SHA256

      29d41c9566739f5371b7e2c1142ffb3c55fe8771d1e4d872d4755ca1f6141f53

    • SHA512

      21f51aac938e2111f72f576255c133471156bb70f70579d257cd97cb582d6b0a30dca0cdbdfd5349e6c0969a4722eb3b2ecd5d812df08f3fdf860553e9b885e6

    • SSDEEP

      3072:mIvn7Ly3sk9L+icToN6eOaJLbPifNr8LY/eqPDc55IvkJhihgJLf0Q:Fn7LyxwHg69obqfVpegwkv+hihcLf0

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks