General

  • Target

    1978eba30a4ec1374d09affead3a90d4175c97e58f34497d798aaa56e685df20

  • Size

    360KB

  • Sample

    230322-l798qaab5v

  • MD5

    3011d8256ead8820223359556ec2c85b

  • SHA1

    403343881d8440f0cae73e82bc41b32c8b9d4816

  • SHA256

    1978eba30a4ec1374d09affead3a90d4175c97e58f34497d798aaa56e685df20

  • SHA512

    49259be1b24ddb1607a78f4760bc937dff58917984a473101f0c5b27e363e90dad72455314e8725832238785dd3b84454637b5018ce0c434a7c6b90f58a5ab3d

  • SSDEEP

    3072:040TlxQfw/y/7juaehfHY1Agbv6oL4OHkfk235cDk5v0WKSNyg/fbakoggwn0JV:O8myVs/Al4OHU3ODkJU6f2E

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Targets

    • Target

      1978eba30a4ec1374d09affead3a90d4175c97e58f34497d798aaa56e685df20

    • Size

      360KB

    • MD5

      3011d8256ead8820223359556ec2c85b

    • SHA1

      403343881d8440f0cae73e82bc41b32c8b9d4816

    • SHA256

      1978eba30a4ec1374d09affead3a90d4175c97e58f34497d798aaa56e685df20

    • SHA512

      49259be1b24ddb1607a78f4760bc937dff58917984a473101f0c5b27e363e90dad72455314e8725832238785dd3b84454637b5018ce0c434a7c6b90f58a5ab3d

    • SSDEEP

      3072:040TlxQfw/y/7juaehfHY1Agbv6oL4OHkfk235cDk5v0WKSNyg/fbakoggwn0JV:O8myVs/Al4OHU3ODkJU6f2E

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks