General

  • Target

    f2e100f576b44fdb37d874db2.exe

  • Size

    4.4MB

  • Sample

    230711-mycrjahf4t

  • MD5

    f2e100f576b44fdb37d874db2e48085c

  • SHA1

    23091a0b5231d69d85866fede573b25577e20414

  • SHA256

    77530f67cff4fc2456c0b27abf28d1ab1f4f10fd9be039783adfa25ed1f7f196

  • SHA512

    14bd861a48f201a195d322e4c00f758996d2be8b6d78a1c927af53a00e029e9be7db4002c48a80f88d2869e9ba412724ec7a47c8da09faf79133df2edc608f85

  • SSDEEP

    98304:fqemq9DObUSOLZ27MJuUfg7Jb/0RCh2fc/xVzVALUx:PzD3SFEuUfcLwCh2Q/RAY

Malware Config

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Targets

    • Target

      f2e100f576b44fdb37d874db2.exe

    • Size

      4.4MB

    • MD5

      f2e100f576b44fdb37d874db2e48085c

    • SHA1

      23091a0b5231d69d85866fede573b25577e20414

    • SHA256

      77530f67cff4fc2456c0b27abf28d1ab1f4f10fd9be039783adfa25ed1f7f196

    • SHA512

      14bd861a48f201a195d322e4c00f758996d2be8b6d78a1c927af53a00e029e9be7db4002c48a80f88d2869e9ba412724ec7a47c8da09faf79133df2edc608f85

    • SSDEEP

      98304:fqemq9DObUSOLZ27MJuUfg7Jb/0RCh2fc/xVzVALUx:PzD3SFEuUfcLwCh2Q/RAY

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks