Analysis

  • max time kernel
    148s
  • max time network
    140s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-08-2023 12:33

General

  • Target

    bdf326424f960a66d01dd645db9fd335a157ceb86d7f482ff15205fa7d9cc7b0.exe

  • Size

    1.8MB

  • MD5

    e5cbc0114ff238740e72e907ad20223c

  • SHA1

    98c5d3c714adb3fbef71c19eaaa53cb680dd2d91

  • SHA256

    bdf326424f960a66d01dd645db9fd335a157ceb86d7f482ff15205fa7d9cc7b0

  • SHA512

    7049adad987de004b179198aa72910c9bc47f5f0095032cc44a9c409bc6337150b05a208e47919e276c74bbbb9bfa1bee6b58575b2176083e0210af6ce9c9b92

  • SSDEEP

    49152:bm/7cijxOPr17ocI5ut5TrCEJ5GtFRpr:bm/7cijcPr9ocI5K5NjGnL

Malware Config

Extracted

Family

laplas

C2

http://clipper.guru

Attributes
  • api_key

    0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e

Extracted

Family

laplas

C2

http://clipper.guru

Attributes
  • api_key

    0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdf326424f960a66d01dd645db9fd335a157ceb86d7f482ff15205fa7d9cc7b0.exe
    "C:\Users\Admin\AppData\Local\Temp\bdf326424f960a66d01dd645db9fd335a157ceb86d7f482ff15205fa7d9cc7b0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4516
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:1508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    726.8MB

    MD5

    5c1cee6437cff3af2d49259476e00037

    SHA1

    eb57063e3ce53d86b11a52254fb44b761e89d845

    SHA256

    171d093a38c6665f9563a147716aafb56a779dfa506ae40163b74612183c36f7

    SHA512

    9dd881f7558ba6f06088f73037576c379e8a5bbc5b373d44a74574c865d420d032ebfdd310978ea72fe4f72c9267d2edec0ab89310a45fb98e3b93dc20c25722

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    757.3MB

    MD5

    edc997eac25edbacd83bcf2798c18d12

    SHA1

    60ac4621aeb0e65f45ff6d0407570cad1076e488

    SHA256

    7a651b3580f0e568ed545809cd58e90911d44a874dc920054a092085207b06b9

    SHA512

    b6b13c782b69f387b8344ace821d9a217edd7833b07120cc84ff52eac08881a851d4e7b775ce9f2f9e3e5d412faf48ac5bc02cf776e91906449c9040f91cfab4

  • memory/1508-133-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-143-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-136-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-148-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-137-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-147-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-130-0x0000000004150000-0x0000000004304000-memory.dmp

    Filesize

    1.7MB

  • memory/1508-138-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-131-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-132-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-146-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-135-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-145-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-144-0x0000000004150000-0x0000000004304000-memory.dmp

    Filesize

    1.7MB

  • memory/1508-142-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-139-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-140-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/1508-141-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/4516-127-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/4516-122-0x0000000004100000-0x00000000042B6000-memory.dmp

    Filesize

    1.7MB

  • memory/4516-120-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/4516-123-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/4516-118-0x0000000004100000-0x00000000042B6000-memory.dmp

    Filesize

    1.7MB

  • memory/4516-119-0x00000000042C0000-0x0000000004690000-memory.dmp

    Filesize

    3.8MB

  • memory/4516-124-0x00000000042C0000-0x0000000004690000-memory.dmp

    Filesize

    3.8MB