General

  • Target

    vvvvv.exe

  • Size

    3.6MB

  • Sample

    230620-lv7bascd71

  • MD5

    e02b07664a5ef23facc9b0de9edfa4ad

  • SHA1

    99efbe63eea3b52751bbabde287f46d3c2d5ad13

  • SHA256

    1ff20950759aac7d67f33f56612cfdcf167478a0a4cd75d0822f4cabf3e3cebb

  • SHA512

    5ddcc0f0f154db22e10ee9344e6f65c93b723c80f3694982f1b830e6fd5ebbb82dfe31ce0372e7002df76a6474055b77a38652e5da2cc4e562c029ea3fcb44a9

  • SSDEEP

    49152:Elskpx5/18azy7dzUWhSwyAjvWetuJI0mR9+O/MjmFJtYeEm0tMpfHc/aVKu0en3:EppTaaylS05tuJYB1D7/5KCzjGo

Malware Config

Extracted

Family

laplas

C2

http://85.192.40.252

Attributes
  • api_key

    a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298

Targets

    • Target

      vvvvv.exe

    • Size

      3.6MB

    • MD5

      e02b07664a5ef23facc9b0de9edfa4ad

    • SHA1

      99efbe63eea3b52751bbabde287f46d3c2d5ad13

    • SHA256

      1ff20950759aac7d67f33f56612cfdcf167478a0a4cd75d0822f4cabf3e3cebb

    • SHA512

      5ddcc0f0f154db22e10ee9344e6f65c93b723c80f3694982f1b830e6fd5ebbb82dfe31ce0372e7002df76a6474055b77a38652e5da2cc4e562c029ea3fcb44a9

    • SSDEEP

      49152:Elskpx5/18azy7dzUWhSwyAjvWetuJI0mR9+O/MjmFJtYeEm0tMpfHc/aVKu0en3:EppTaaylS05tuJYB1D7/5KCzjGo

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks