General

  • Target

    e1290a9463ef7d1d61645b7d3fd3e4a7518023091f85ab4085308f70d437707f

  • Size

    3.0MB

  • Sample

    230507-jk9ybsha7t

  • MD5

    e81570d802d26df3dde953770c8c9766

  • SHA1

    d8df423343b59f8b53f10722b023622477e5fb31

  • SHA256

    e1290a9463ef7d1d61645b7d3fd3e4a7518023091f85ab4085308f70d437707f

  • SHA512

    1d03bc26a97b4eb680fe9d1996c525e086f6efcb40db2946e7297544a85cd0b6999ac03ed11048dc424631a643ba95a0624865351e86fb76ebc61641c73b7778

  • SSDEEP

    98304:XWrcYe0Hec7sl5cWF4bMQDZSQav8CzmU+z:5YQ7vcWOxSQasJz

Malware Config

Extracted

Family

laplas

C2

http://89.23.97.128

Attributes
  • api_key

    bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396

Targets

    • Target

      e1290a9463ef7d1d61645b7d3fd3e4a7518023091f85ab4085308f70d437707f

    • Size

      3.0MB

    • MD5

      e81570d802d26df3dde953770c8c9766

    • SHA1

      d8df423343b59f8b53f10722b023622477e5fb31

    • SHA256

      e1290a9463ef7d1d61645b7d3fd3e4a7518023091f85ab4085308f70d437707f

    • SHA512

      1d03bc26a97b4eb680fe9d1996c525e086f6efcb40db2946e7297544a85cd0b6999ac03ed11048dc424631a643ba95a0624865351e86fb76ebc61641c73b7778

    • SSDEEP

      98304:XWrcYe0Hec7sl5cWF4bMQDZSQav8CzmU+z:5YQ7vcWOxSQasJz

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks