Analysis

  • max time kernel
    146s
  • max time network
    133s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-04-2023 10:10

General

  • Target

    3a4712fe53943012eabe3d9b70436588be5f7d3b5d2c6abeaf3070e26cb4eafb.exe

  • Size

    1.8MB

  • MD5

    484f306b6b2cddfa346936023aa886a5

  • SHA1

    8b6a851469319d5b1df0449775aa95b0138d8a8c

  • SHA256

    3a4712fe53943012eabe3d9b70436588be5f7d3b5d2c6abeaf3070e26cb4eafb

  • SHA512

    542eb0acd401d52fcea808e248a32f6f4c929f7a31eb9a5c6c6d04555ad9f1b30fdd15f1e71c9701c25efbd2cf562da0f39f3b423db854a324a711f2f0a7ceb5

  • SSDEEP

    49152:BMZrwVqn+0E3OcR+SpxJfwYRZlO2Hcke4fwv9OaOzrWc1ifUzvL+a:KMVqn+OcR1pxRZlO2Hcv9OrWc1iO

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a4712fe53943012eabe3d9b70436588be5f7d3b5d2c6abeaf3070e26cb4eafb.exe
    "C:\Users\Admin\AppData\Local\Temp\3a4712fe53943012eabe3d9b70436588be5f7d3b5d2c6abeaf3070e26cb4eafb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:4556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    847.8MB

    MD5

    455a4b50d30f2578c50488b6ab467e3a

    SHA1

    5f1374e5b86d94410e15cfc163f1eb35e295ab55

    SHA256

    6906eb7ee647ef661308f7ddfdf37a19d3feb506b2b54e9e503d2e36a4895c7e

    SHA512

    baeef15828b2ba0a69f56acfac3eae46de9234e68245d53d2f6d51c5700509d2d73a1725de4c6fa5f684fe2469cb6c830cceb5fc03ac7646a9eefd61fa3b30a2

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    847.8MB

    MD5

    455a4b50d30f2578c50488b6ab467e3a

    SHA1

    5f1374e5b86d94410e15cfc163f1eb35e295ab55

    SHA256

    6906eb7ee647ef661308f7ddfdf37a19d3feb506b2b54e9e503d2e36a4895c7e

    SHA512

    baeef15828b2ba0a69f56acfac3eae46de9234e68245d53d2f6d51c5700509d2d73a1725de4c6fa5f684fe2469cb6c830cceb5fc03ac7646a9eefd61fa3b30a2

  • memory/4124-117-0x00000000028B0000-0x0000000002C80000-memory.dmp

    Filesize

    3.8MB

  • memory/4124-123-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4556-129-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4556-132-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4556-126-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4556-128-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4556-124-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4556-130-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4556-131-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4556-125-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4556-133-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4556-134-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4556-135-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4556-136-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4556-137-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/4556-138-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB