General

  • Target

    73341bc80c4983f7e88d3fc0e95b8746aa00cb8acba2b3e08776782a2d53941b

  • Size

    3.0MB

  • Sample

    230507-dycxvsca5x

  • MD5

    767368afad019d5edbe21da0624d0aeb

  • SHA1

    5679da5ac1514c7a73a790b23bea7ac972e0d2f8

  • SHA256

    73341bc80c4983f7e88d3fc0e95b8746aa00cb8acba2b3e08776782a2d53941b

  • SHA512

    5b397df629a76c57577e5dea05bb31df820aae61984b54986a13f058e9e13ed651921122819e2483d3546bd7b7fbf81f9c1370f10c90c15b6cc678f4f9cffaef

  • SSDEEP

    49152:mhhQZmZBmCB7jzyqnqlaHprubMKs4PTu4853wLPrs9Sirh67l+G5IkT6d+1X1pe:mXtZICB7jmq4AHMywLP4nrc5I3+l6

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.33

Attributes
  • api_key

    d1a05de376c0be1daa56dfb2715c8a0c5df8a111b8b31decc886df1e48db7c9c

Targets

    • Target

      73341bc80c4983f7e88d3fc0e95b8746aa00cb8acba2b3e08776782a2d53941b

    • Size

      3.0MB

    • MD5

      767368afad019d5edbe21da0624d0aeb

    • SHA1

      5679da5ac1514c7a73a790b23bea7ac972e0d2f8

    • SHA256

      73341bc80c4983f7e88d3fc0e95b8746aa00cb8acba2b3e08776782a2d53941b

    • SHA512

      5b397df629a76c57577e5dea05bb31df820aae61984b54986a13f058e9e13ed651921122819e2483d3546bd7b7fbf81f9c1370f10c90c15b6cc678f4f9cffaef

    • SSDEEP

      49152:mhhQZmZBmCB7jzyqnqlaHprubMKs4PTu4853wLPrs9Sirh67l+G5IkT6d+1X1pe:mXtZICB7jmq4AHMywLP4nrc5I3+l6

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks