General

  • Target

    crona.exe

  • Size

    3.7MB

  • Sample

    230614-y57q2ade9t

  • MD5

    ccf4763882256111f713d881ad7d9aa9

  • SHA1

    507297f20fd3fbda9a8cd426bbcffdeb8e4e8ab1

  • SHA256

    59d9b80d021e8dc40f387d759ce6f77c56330a07352c0238f1768116cf80ebf7

  • SHA512

    53d20ba5739d1205be1b16966d981881ea8c9b0b8c9880b1e407f354e025b6ccae61e653b78d6a9e3d9c5023ff09143b365545c411809b645ac24f8620580416

  • SSDEEP

    98304:o+bU8AtKpng3RiQT0Q9zc7J7MRNCwZMGzcf+UctPK0:o+bUVtKxg3RiQ7z0J7MuwDzcGUck

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e

Targets

    • Target

      crona.exe

    • Size

      3.7MB

    • MD5

      ccf4763882256111f713d881ad7d9aa9

    • SHA1

      507297f20fd3fbda9a8cd426bbcffdeb8e4e8ab1

    • SHA256

      59d9b80d021e8dc40f387d759ce6f77c56330a07352c0238f1768116cf80ebf7

    • SHA512

      53d20ba5739d1205be1b16966d981881ea8c9b0b8c9880b1e407f354e025b6ccae61e653b78d6a9e3d9c5023ff09143b365545c411809b645ac24f8620580416

    • SSDEEP

      98304:o+bU8AtKpng3RiQT0Q9zc7J7MRNCwZMGzcf+UctPK0:o+bUVtKxg3RiQ7z0J7MuwDzcGUck

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks