General

  • Target

    40c57e10a331694ef881d692c16e8add421f56e9c49fbd2ba2b7519d6389f2a2

  • Size

    3.3MB

  • Sample

    230508-3maqssfb3v

  • MD5

    20e7298962b08a7caec75a45b67978ce

  • SHA1

    c2e44c702d9cc6c4db751230f7f2245986523277

  • SHA256

    40c57e10a331694ef881d692c16e8add421f56e9c49fbd2ba2b7519d6389f2a2

  • SHA512

    3d341cf9da1922c45379a77126f95e36839aa3018874ce5ece61c1ea217310a0a8f355a935424e8f97ede8181cd493bd8e97c24b90c199fa3d5818f9308ba237

  • SSDEEP

    98304:RNk7q2ZGeQj6Aj3zn2UUuNbHlXN2An3P+7Lv2:TXEVa6A/nNtlXNf3P4

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e

Targets

    • Target

      40c57e10a331694ef881d692c16e8add421f56e9c49fbd2ba2b7519d6389f2a2

    • Size

      3.3MB

    • MD5

      20e7298962b08a7caec75a45b67978ce

    • SHA1

      c2e44c702d9cc6c4db751230f7f2245986523277

    • SHA256

      40c57e10a331694ef881d692c16e8add421f56e9c49fbd2ba2b7519d6389f2a2

    • SHA512

      3d341cf9da1922c45379a77126f95e36839aa3018874ce5ece61c1ea217310a0a8f355a935424e8f97ede8181cd493bd8e97c24b90c199fa3d5818f9308ba237

    • SSDEEP

      98304:RNk7q2ZGeQj6Aj3zn2UUuNbHlXN2An3P+7Lv2:TXEVa6A/nNtlXNf3P4

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks