Analysis

  • max time kernel
    68s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2023 17:07

General

  • Target

    conhost.exe

  • Size

    4.0MB

  • MD5

    feccda803ece2e7a3b7e9798714ad47e

  • SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

  • SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

  • SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • SSDEEP

    49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe

Malware Config

Extracted

Family

laplas

C2

http://185.223.93.251

Attributes
  • api_key

    f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\conhost.exe
    "C:\Users\Admin\AppData\Local\Temp\conhost.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:1732

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    579.8MB

    MD5

    23b62f20a956812727c829694365ab97

    SHA1

    c9c6a30dbbc535740df25480a8f0cd0b1bd47e0a

    SHA256

    3cf24af2ba1569261a3d30217a2cad839db8c043edd41f2dffe30ab154e87f75

    SHA512

    01c03ddfa5a73d535487f009365b67643123050d55d3eb49dedc35f25451d9f1cc92c5581bea13f2d15aca1a15012de1832e8a6d04f6fa6cff936749fa8fe6ad

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    598.6MB

    MD5

    88c2d1c3b0b13aca7ce80ffd4b687af1

    SHA1

    44c7ec14f26d92b8d74d994e994b31451688afb8

    SHA256

    3761d015d36daab0c13bb8b986e7d5f50e1731b67f9ba5a54032283b9e978005

    SHA512

    7ff27f90c4d053a0e64a205771721146066223b63d87eebec42e469fa61d44724c475503d149c49af376dc73296d441ec80394ad16a0c01cbad8142866f172f8

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    555.9MB

    MD5

    b4d0045243b10964ff58be0fc58b6f46

    SHA1

    0ab02228c9a87e8464fe30543f3fa801907781ce

    SHA256

    e44432c1c46f99203d8eae2c7e47a95aabcd6e700ff0afc91b92817e38a9afb2

    SHA512

    be9da4749309224ca2ff66ab3989e62ef10ba063dda2f326ef4f8987e550e77b361178c8deace7d4258f42ff93e9ed7dfb2ca0e7176d976a43eea8b64f51ba10