Analysis

  • max time kernel
    69s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2023 11:25

General

  • Target

    conhost.exe

  • Size

    4.0MB

  • MD5

    feccda803ece2e7a3b7e9798714ad47e

  • SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

  • SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

  • SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • SSDEEP

    49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe

Malware Config

Extracted

Family

laplas

C2

http://185.223.93.251

Attributes
  • api_key

    f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\conhost.exe
    "C:\Users\Admin\AppData\Local\Temp\conhost.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:1956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    582.7MB

    MD5

    292da86d7300996d4ec995c9ba2ccb0c

    SHA1

    e18cdb3b5df4fd9053a9640b5e3ac9f03eea365e

    SHA256

    ccdf4348f6e98b763b9181862c986a932b3fc2de9ea8f788e03f14f8691915b8

    SHA512

    498954a94620181a98d523d3f6541872d5f8d420f425766e80328a5bebc9380dd5cb67019755522d64bba1096d547a0138b0cd610fd69bae254271558697b5b9

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    575.1MB

    MD5

    1987c2985b63dee0ca2ff8056dc5f2c0

    SHA1

    0cc132dc85976df1bd69684b95807279ccce4046

    SHA256

    5803266c05d87123d6a3aebd23e8bf5d440eaccde01bb62fd7876e0cc1457eda

    SHA512

    4452f0b26499c3bc0ef9f39b73844af799670fcfc4e9ad580b75305bcc18194185b224826c8775b006d27b4f83a70b069444edcc9e5bc37b94396634f2401163

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    424.0MB

    MD5

    45c6715a10e7e957229f5fa50585bd47

    SHA1

    1e9370e41873df46c787647c8f44e75f21330297

    SHA256

    bf99e4a1b7c7628cb48e911e69e30ff2734f8f609e215e3e946d350f2d89bb8d

    SHA512

    7d6934d2e96050047209c1e6f6c04e900077d0a44b986d01b30ca8f16d2a4745299c2bee0669480a4ca0aaa1f58ff8b0cad820ceae79f82b1732c54933cf76c7