Analysis

  • max time kernel
    144s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2023 14:38

General

  • Target

    2297b0cced9fde691e8f430d0198f76227b3e617658a6119753d942f9677f589.exe

  • Size

    1.9MB

  • MD5

    8c59b0c004d6d108c494ed8e96f573bb

  • SHA1

    62856aa334190053f0e3b41f7f379a77aaf1cdb1

  • SHA256

    2297b0cced9fde691e8f430d0198f76227b3e617658a6119753d942f9677f589

  • SHA512

    2c966dde8aa92dec51080a02a38c8ed207cd51fc8196bd6a92e3eff316bb6370c90900f3b6c0d5d06e93f34ef925c509cb2c11f3d16a0cd3dc8984f853f85a6d

  • SSDEEP

    49152:mG1dhlVkEIUaOM8Tb9E4V4GwayVg53tW0S6ndKE:mG/hkPUaX8/64x0g5jS24

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2297b0cced9fde691e8f430d0198f76227b3e617658a6119753d942f9677f589.exe
    "C:\Users\Admin\AppData\Local\Temp\2297b0cced9fde691e8f430d0198f76227b3e617658a6119753d942f9677f589.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:3280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    820.9MB

    MD5

    bd1d1ba15a7ba651fd6c874a5ba294ed

    SHA1

    489cad152fc65959612b3df358e8b04f0b7f78ad

    SHA256

    d46258a22c3ddf70634fd20f9c03bd166249d789209501df937080c55c10649e

    SHA512

    8efdbc66cba9c708b5af91ed9b52923f5ce8c1973a176ea2b38a42a1bbdbbc655c759d3f238e976e6d20b1dd084a476034f1db2ac49dbf3c9df94a15ca838f58

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    820.9MB

    MD5

    bd1d1ba15a7ba651fd6c874a5ba294ed

    SHA1

    489cad152fc65959612b3df358e8b04f0b7f78ad

    SHA256

    d46258a22c3ddf70634fd20f9c03bd166249d789209501df937080c55c10649e

    SHA512

    8efdbc66cba9c708b5af91ed9b52923f5ce8c1973a176ea2b38a42a1bbdbbc655c759d3f238e976e6d20b1dd084a476034f1db2ac49dbf3c9df94a15ca838f58

  • memory/2588-134-0x0000000004C70000-0x0000000005040000-memory.dmp

    Filesize

    3.8MB

  • memory/2588-136-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/2588-139-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/3280-146-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/3280-143-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/3280-144-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/3280-142-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/3280-147-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/3280-148-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/3280-149-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/3280-150-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/3280-151-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/3280-152-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/3280-153-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/3280-154-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/3280-155-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB