General

  • Target

    f5d957a42f578847664cacb8a4c3d695.bin

  • Size

    7.1MB

  • Sample

    230321-cf8q5sgd63

  • MD5

    96fa8bfd2076167b5440a99754887e80

  • SHA1

    c310ace2790418800eafe96c590f01cd8bb4ff3f

  • SHA256

    6227d0d5d716d3396eabe9522bdac2bac6731873dfcc9ac1ed38562fd775fb55

  • SHA512

    c62103672bb36a2965b67e65f144463523b8dcc55c1ed40458d6bc9dba7f518364b864c45f38d26e10b18bce63a8515ee6f550df6cf18bc7c8cacbe32d6d918f

  • SSDEEP

    196608:ie0SBIgCxnmI+vtIm8guDP/oSGvUVSdoSzE86AIpuccJ:b0kIgCxnmI+vKgSPFGv5ySzE8SuF

Malware Config

Extracted

Family

laplas

C2

http://212.113.106.172

Attributes
  • api_key

    a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298

Targets

    • Target

      00978d16ecc2b0f6cf039b3bef087a8542d2092d8f95f36104f2329f7bf362dc.exe

    • Size

      7.5MB

    • MD5

      f5d957a42f578847664cacb8a4c3d695

    • SHA1

      5affbea912936570480b7a6a0a7e67c6a2f62ec9

    • SHA256

      00978d16ecc2b0f6cf039b3bef087a8542d2092d8f95f36104f2329f7bf362dc

    • SHA512

      07821df782858665c810e959e92f78de4af56e8d090069c5637537338244f9348f7a878bff95d72620b4c092fd97cfb2d15ffe1c097c36a86399a478ea406980

    • SSDEEP

      196608:ZOtzW0BrGc/4GmLcBh8YSZIEqsyZr2caC78:kVW6Gc//B/xEh+a

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks