General

  • Target

    3405a14bdc05e4bca019b1b36.exe

  • Size

    4.1MB

  • Sample

    230708-k24cjsed7s

  • MD5

    71f04aa7d5c3232c7c2b9afad6777b53

  • SHA1

    617487d25e1b3c27112c918e54deb744c57e9fa9

  • SHA256

    3405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269

  • SHA512

    1068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe

  • SSDEEP

    98304:CmICyUcKzmy4XlAD2R3e22RMHRPnZNCVb25cfFKG88ZvvRqgx:Cm/nzslADie22mHdZNh5078Cvv

Malware Config

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Targets

    • Target

      3405a14bdc05e4bca019b1b36.exe

    • Size

      4.1MB

    • MD5

      71f04aa7d5c3232c7c2b9afad6777b53

    • SHA1

      617487d25e1b3c27112c918e54deb744c57e9fa9

    • SHA256

      3405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269

    • SHA512

      1068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe

    • SSDEEP

      98304:CmICyUcKzmy4XlAD2R3e22RMHRPnZNCVb25cfFKG88ZvvRqgx:Cm/nzslADie22mHdZNh5078Cvv

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks