General

  • Target

    NEAS.f4e1e373d12a061131d533b8648ce880.exe

  • Size

    7.0MB

  • Sample

    231022-v4szpscf89

  • MD5

    f4e1e373d12a061131d533b8648ce880

  • SHA1

    a86c8d6f87d2de3767642c735d772e831bdc79db

  • SHA256

    fda3a4f1ba51eb0528c406bc94c454e28281d7d3d82c249880659222dc47a754

  • SHA512

    12c66ee73500f3254e4cb6425462f502b13f8410c095ee648d52789f48154c3b6a43c9762049bdb196b81d73d5488bbb69fb1266a1a150294164fdd4ae0a7d17

  • SSDEEP

    98304:jBFr1GYY6ihQXeuhAgNcpdWK07pWUd/nwdA1GUylyXE6Z2Uk/u0btp6rATIufqWn:1/7kdEQUd/nwu1GY0bToAESaFuv

Malware Config

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Targets

    • Target

      NEAS.f4e1e373d12a061131d533b8648ce880.exe

    • Size

      7.0MB

    • MD5

      f4e1e373d12a061131d533b8648ce880

    • SHA1

      a86c8d6f87d2de3767642c735d772e831bdc79db

    • SHA256

      fda3a4f1ba51eb0528c406bc94c454e28281d7d3d82c249880659222dc47a754

    • SHA512

      12c66ee73500f3254e4cb6425462f502b13f8410c095ee648d52789f48154c3b6a43c9762049bdb196b81d73d5488bbb69fb1266a1a150294164fdd4ae0a7d17

    • SSDEEP

      98304:jBFr1GYY6ihQXeuhAgNcpdWK07pWUd/nwdA1GUylyXE6Z2Uk/u0btp6rATIufqWn:1/7kdEQUd/nwu1GY0bToAESaFuv

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks