Analysis

  • max time kernel
    26s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    19-05-2023 10:37

General

  • Target

    conhost.exe

  • Size

    4.0MB

  • MD5

    feccda803ece2e7a3b7e9798714ad47e

  • SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

  • SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

  • SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • SSDEEP

    49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe

Malware Config

Extracted

Family

laplas

C2

http://185.223.93.251

Attributes
  • api_key

    f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\conhost.exe
    "C:\Users\Admin\AppData\Local\Temp\conhost.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    554.9MB

    MD5

    f0974f8fb7636fb3810225c48b990490

    SHA1

    84de500be6bb64ce2a0910486dacde4c3f7bfc77

    SHA256

    501c4c9b57e6ff5c443a089e9fc3b1eaf4cac010dd66d37bf3f8f7e60fc8eb5a

    SHA512

    b0beaf53249148721cc457024f9cab640d934a6f6bfaa2317c175d6f514177d972ce9d45d9145b03f285968333cbdba7036e5cdd43f450e3ce5397df87e64c8f

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    555.8MB

    MD5

    0df1ed8f08d7c6e7926cb617bb1fba42

    SHA1

    bb5e85217f36f4613a8d2cd6047f1a993b455f95

    SHA256

    e0812dee46cda4b09676d967f444575563c1cf702e54d6b0c73576290aef3f54

    SHA512

    d3840fa4fb7969f3273a8596cc2e595143f668b1443b3cb66b727766325141ac7cddc676e1b65713d0a1969434a2bf1e4a6ded18e8c19e0048714ba8d1fbb8b0

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    538.8MB

    MD5

    417f0f9b09fa38d9e923d3d338627207

    SHA1

    c3678cedc26c3e44480a405712b57060619f293b

    SHA256

    765b8510283f843531d1dabc53fccfaa9fe76a853100f8c2ff3d4722ed633670

    SHA512

    d06e938d1251d6a090d87042bb943bbb984dd3e0794f0f01a12ef848306ccc206045c963ecd2c24f0cf06792534631ff3cc35f1d5539703e7edb560f0066ab45