General

  • Target

    34fe727a0ee5e713e228440cb9395c77a8cbc83f106b6328ecbeb0d3ac6a1404

  • Size

    3.1MB

  • Sample

    230421-17frfacc21

  • MD5

    accbcf9680c8bf835cf0eabf91b33723

  • SHA1

    2d27a9626a83c7c452f23fa3e2349457e0469c27

  • SHA256

    34fe727a0ee5e713e228440cb9395c77a8cbc83f106b6328ecbeb0d3ac6a1404

  • SHA512

    43696acf7f4b76975afb534c2581ab82b015f2e23dc30fd4f40aefb6eaeccad11d01d922c68f92c6f8be05cc6056f15a67895fc60ce4c36015c02201b8d98c26

  • SSDEEP

    98304:k5BekM0DcBgg5WVJRG6wsW6WY3ZrfrPfw0kN//ItdLGt:UzM0Yyg5WVJLW6R3dLfcN8Lc

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79

Targets

    • Target

      34fe727a0ee5e713e228440cb9395c77a8cbc83f106b6328ecbeb0d3ac6a1404

    • Size

      3.1MB

    • MD5

      accbcf9680c8bf835cf0eabf91b33723

    • SHA1

      2d27a9626a83c7c452f23fa3e2349457e0469c27

    • SHA256

      34fe727a0ee5e713e228440cb9395c77a8cbc83f106b6328ecbeb0d3ac6a1404

    • SHA512

      43696acf7f4b76975afb534c2581ab82b015f2e23dc30fd4f40aefb6eaeccad11d01d922c68f92c6f8be05cc6056f15a67895fc60ce4c36015c02201b8d98c26

    • SSDEEP

      98304:k5BekM0DcBgg5WVJRG6wsW6WY3ZrfrPfw0kN//ItdLGt:UzM0Yyg5WVJLW6R3dLfcN8Lc

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks