General

  • Target

    4b849d412245437a6185de355d24799911f08df34a5c77e265c6b7222e84337a.bin

  • Size

    3.1MB

  • Sample

    230501-txem3aee2z

  • MD5

    36538f9861e330d5ac9310418f615bf9

  • SHA1

    ab32322f5094133b4f75ab10d63a3705cb2064c8

  • SHA256

    4b849d412245437a6185de355d24799911f08df34a5c77e265c6b7222e84337a

  • SHA512

    9c79444bea20258e71e782ebbdeceb71547f5be54764088f6aba0a0062fce3f8277546bd2f294ae040804196a8e41e99d057449f73d4cbfc4d0213eaa12bdb68

  • SSDEEP

    49152:8DOm/UnwYvirEus6NRwMwyfaQb+Tch+kmqk2ls0Oz4HoJ1c0TrBO8THK6aLhlLFq:8xUwiijeMLfRb+Tirdkt0O8Hybrj6HH

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.33

Attributes
  • api_key

    d1a05de376c0be1daa56dfb2715c8a0c5df8a111b8b31decc886df1e48db7c9c

Targets

    • Target

      4b849d412245437a6185de355d24799911f08df34a5c77e265c6b7222e84337a.bin

    • Size

      3.1MB

    • MD5

      36538f9861e330d5ac9310418f615bf9

    • SHA1

      ab32322f5094133b4f75ab10d63a3705cb2064c8

    • SHA256

      4b849d412245437a6185de355d24799911f08df34a5c77e265c6b7222e84337a

    • SHA512

      9c79444bea20258e71e782ebbdeceb71547f5be54764088f6aba0a0062fce3f8277546bd2f294ae040804196a8e41e99d057449f73d4cbfc4d0213eaa12bdb68

    • SSDEEP

      49152:8DOm/UnwYvirEus6NRwMwyfaQb+Tch+kmqk2ls0Oz4HoJ1c0TrBO8THK6aLhlLFq:8xUwiijeMLfRb+Tirdkt0O8Hybrj6HH

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks