General

  • Target

    Installer.exe

  • Size

    5.0MB

  • Sample

    230324-c2fbqabg25

  • MD5

    7f6e6211f715679a559e695cce334801

  • SHA1

    6c74f4269d5e5b6fd96b02fd9b0e8d86eae1cab5

  • SHA256

    a712edcd797e4f33522d77382e7eae9b55eddaaa753ac33da65af73e0b6e785f

  • SHA512

    b0732f3ad124a745952a90ad5df08f67e438bbaf63d2f5a4060d98873a219b8bd4a655089825a5a5f254b57d40c6b194dac77cf1bfe22a15a04cf0ed766943ac

  • SSDEEP

    98304:EELNQWOGMWGapFt7G67QI1sbfr30wz93R:EELyWJMWGIgVUuR

Malware Config

Extracted

Family

laplas

C2

http://193.233.20.134

Attributes
  • api_key

    57728dce0f7018e17faf9f061cb2d77048e08414376baf6d860b78e74e83c208

Targets

    • Target

      Installer.exe

    • Size

      5.0MB

    • MD5

      7f6e6211f715679a559e695cce334801

    • SHA1

      6c74f4269d5e5b6fd96b02fd9b0e8d86eae1cab5

    • SHA256

      a712edcd797e4f33522d77382e7eae9b55eddaaa753ac33da65af73e0b6e785f

    • SHA512

      b0732f3ad124a745952a90ad5df08f67e438bbaf63d2f5a4060d98873a219b8bd4a655089825a5a5f254b57d40c6b194dac77cf1bfe22a15a04cf0ed766943ac

    • SSDEEP

      98304:EELNQWOGMWGapFt7G67QI1sbfr30wz93R:EELyWJMWGIgVUuR

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks