General

  • Target

    vsawx.exe

  • Size

    3.5MB

  • Sample

    230620-lvvx9sbc35

  • MD5

    57860572c76d9e9706d5a0303f732e06

  • SHA1

    1c961cf589208a2fafa89776ef7867cd90a943ef

  • SHA256

    7d9fc01649122d115d93c141b327e3b22b20f6290998670d0c068633dfcf3b4a

  • SHA512

    f71c312cc2717bebfa0116df315745aa90c2f15baa9065abc59049146391bb8f920466f8a5964b6e70a47963121f050b488412f4e8af3086eb6e04312f73cca0

  • SSDEEP

    49152:DpB2N5pbYWxQBzIwuTwsP5nTz9KfnSUIN6d/oLRIO9MS1MXYr0fL3h:GDbdOIwHETpKfnSp+Q9IfXi4Lx

Malware Config

Extracted

Family

laplas

C2

http://85.192.40.252

Attributes
  • api_key

    a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298

Targets

    • Target

      vsawx.exe

    • Size

      3.5MB

    • MD5

      57860572c76d9e9706d5a0303f732e06

    • SHA1

      1c961cf589208a2fafa89776ef7867cd90a943ef

    • SHA256

      7d9fc01649122d115d93c141b327e3b22b20f6290998670d0c068633dfcf3b4a

    • SHA512

      f71c312cc2717bebfa0116df315745aa90c2f15baa9065abc59049146391bb8f920466f8a5964b6e70a47963121f050b488412f4e8af3086eb6e04312f73cca0

    • SSDEEP

      49152:DpB2N5pbYWxQBzIwuTwsP5nTz9KfnSUIN6d/oLRIO9MS1MXYr0fL3h:GDbdOIwHETpKfnSp+Q9IfXi4Lx

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks