General

  • Target

    golang.exe

  • Size

    681.7MB

  • Sample

    230627-saqw5sfe3v

  • MD5

    8d5ef85d4a5fda23812f7c2e80d84dd4

  • SHA1

    682705a1d5e86922ab91dd1ffbd6ea4cdd6d8012

  • SHA256

    fd36a0fe2ad2825423020ef28995e2ba531180528a1dad14ac3994339efec853

  • SHA512

    c8fb4bb15218d5370262a95cda853093def4e9601c50faa55d8896a59d12ad0d2df39671288e41e14ecd9ca53600f749a4dab0aea1fa642aeaca882b1512dc04

  • SSDEEP

    49152:Qonm104JVM4OcgDuOzVxpS7fjofPc1Gi0c0coPfvC/5NUS2FB5ZrA8:Pn1V4O7uIQ7UPS053fvI5NyLM8

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    0600485e41f77bbd2d4b1326d099ed57b2055cd58748ff2c8b2575fc34950a02

Targets

    • Target

      golang.exe

    • Size

      681.7MB

    • MD5

      8d5ef85d4a5fda23812f7c2e80d84dd4

    • SHA1

      682705a1d5e86922ab91dd1ffbd6ea4cdd6d8012

    • SHA256

      fd36a0fe2ad2825423020ef28995e2ba531180528a1dad14ac3994339efec853

    • SHA512

      c8fb4bb15218d5370262a95cda853093def4e9601c50faa55d8896a59d12ad0d2df39671288e41e14ecd9ca53600f749a4dab0aea1fa642aeaca882b1512dc04

    • SSDEEP

      49152:Qonm104JVM4OcgDuOzVxpS7fjofPc1Gi0c0coPfvC/5NUS2FB5ZrA8:Pn1V4O7uIQ7UPS053fvI5NyLM8

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks