General

  • Target

    613d401501fccdf49d405bb8b6ce5f6fe96a2619db54e1e7a6f2410eb2aec72c

  • Size

    3.2MB

  • Sample

    230721-alxjysbh7w

  • MD5

    4472444218925ed8fd4982f141af1978

  • SHA1

    101ff99cec2f571002915f23290d495671967db3

  • SHA256

    613d401501fccdf49d405bb8b6ce5f6fe96a2619db54e1e7a6f2410eb2aec72c

  • SHA512

    b2255bced17a9cf9ab8afb461cea7005d2df77984f3122609d82d9a2f7f5ec3ca23ee8f20f609e60937db134ef721bf90fd759ddbe4df9acbf6216d8d2e15cff

  • SSDEEP

    98304:iiuvmFRChTCXAVCAujVcbeyLwQ5ltcD6VIl:VRI8AaadcDhl

Malware Config

Extracted

Family

laplas

C2

http://168.100.10.236

Attributes
  • api_key

    f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79

Targets

    • Target

      613d401501fccdf49d405bb8b6ce5f6fe96a2619db54e1e7a6f2410eb2aec72c

    • Size

      3.2MB

    • MD5

      4472444218925ed8fd4982f141af1978

    • SHA1

      101ff99cec2f571002915f23290d495671967db3

    • SHA256

      613d401501fccdf49d405bb8b6ce5f6fe96a2619db54e1e7a6f2410eb2aec72c

    • SHA512

      b2255bced17a9cf9ab8afb461cea7005d2df77984f3122609d82d9a2f7f5ec3ca23ee8f20f609e60937db134ef721bf90fd759ddbe4df9acbf6216d8d2e15cff

    • SSDEEP

      98304:iiuvmFRChTCXAVCAujVcbeyLwQ5ltcD6VIl:VRI8AaadcDhl

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks