General

  • Target

    9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c

  • Size

    3.0MB

  • Sample

    230422-3agnkshd37

  • MD5

    dbdba768cb5b67b0842eda1e3c11974c

  • SHA1

    ee2a619faeec9d1a264cd2940aaa2b90f2664f7a

  • SHA256

    9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c

  • SHA512

    6d307722d4c5884e2e512481e7a7dc33b4e7b3323937d2abd5defa9e2b5c1600f10002e6d1eee5b55b11c5e1e2551508da5b770d7b538b123b224f266c5a6c0f

  • SSDEEP

    49152:BkdbxujNKgmVvtcLH7QAjiSIXHhWW4055ugkQyAzKhUpMvUAl1qHIoxJlrgrp1b3:apxujNKgCvtjhRj5h4huMvU41qooxr03

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.33

Attributes
  • api_key

    d1a05de376c0be1daa56dfb2715c8a0c5df8a111b8b31decc886df1e48db7c9c

Targets

    • Target

      9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c

    • Size

      3.0MB

    • MD5

      dbdba768cb5b67b0842eda1e3c11974c

    • SHA1

      ee2a619faeec9d1a264cd2940aaa2b90f2664f7a

    • SHA256

      9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c

    • SHA512

      6d307722d4c5884e2e512481e7a7dc33b4e7b3323937d2abd5defa9e2b5c1600f10002e6d1eee5b55b11c5e1e2551508da5b770d7b538b123b224f266c5a6c0f

    • SSDEEP

      49152:BkdbxujNKgmVvtcLH7QAjiSIXHhWW4055ugkQyAzKhUpMvUAl1qHIoxJlrgrp1b3:apxujNKgCvtjhRj5h4huMvU41qooxr03

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks