Cyble Research and Intelligence Labs tracks SmokeLoader campaigns that carry SystemBC and Raccoon Stealer 2.0 (RecordBreaker) alongside a new clipper named Laplas Clipper targeting cryptocurrency users. Laplas Clipper uses clipboard hijacking to swap wallet addresses, backed by a modular loader, persistence, and a web panel for command-and-control. #LaplasClipper #SmokeLoader
Keypoints
- Laplas Clipper targets cryptocurrency users and has appeared in over 180 samples in the last two weeks, indicating rapid deployment.
- SmokeLoader acts as a loader that downloads SystemBC RAT, RecordBreaker (Raccoon Stealer 2.0), and Laplas Clipper from remote URLs.
- Laplas Clipper monitors the clipboard for cryptocurrency addresses and replaces them with attacker wallet addresses using remote regex patterns.
- The clipper loads a memory module named “build.exe,” creates a mutex to ensure a single instance, and injects into the system for execution.
- Persistence is achieved via a scheduled task (schtasks) that runs regularly for an extended period.
- A regex pattern is downloaded from a C2 server (clipper.guru) to identify wallets across many currencies, and TA wallet addresses are fetched from the server.
- The campaign features a Laplas web panel for C2 control, wallet management, and infected-host dashboards.
MITRE Techniques
- [T1203] Exploitation for Client Execution – SmokeLoader is distributed via malicious documents such as Word/PDF documents, sent through spam emails, or targeted spear-phishing attacks. ‘Generally, the SmokeLoader is either distributed via malicious documents such as Word/PDF documents, sent through spam emails, or targeted spear-phishing attacks.’
- [T1204] User Execution – The initial infection happens via spam email, so the enterprise should use email-based security to detect phishing emails. ‘The initial infection happens via spam email, so the enterprise should use email-based security to detect phishing emails.’
- [T1053] Scheduled Task/Job – The clipper creates a persistence mechanism via a scheduled task: ‘cmd.exe /C schtasks /create /tn {0} /tr ”{1}” /st 00:00 /du 9999:59 /sc once /ri 1 /f’
- [T1055] Process Injection – Upon execution, the malware loads a new module named “build.exe” in memory to perform clipper activities. ‘the clipper loads a new module named “build.exe” in memory which performs the clipper activities.’
- [T1027] Software Packing – The sample is VB.NET and protected by VMProtect, illustrating packing/obfuscation: ‘The sample … is compiled using VB.NET and protected by VMProtect.’
- [T1562] Defense Evasion – VMProtect and packing/obfuscation used to hinder analysis: ‘Software Packing’ and ‘Virtualization/Sandbox Evasion’ (VMProtect).
- [T1071] Application Layer Protocol – The clipper downloads additional malware and communicates with C2 URLs: ‘downloads additional malware from the following URLs.’
- [T1105] Ingress Tool Transfer – The downloader fetches SystemBC/RecordBreaker/Laplas from remote URLs: ‘downloads additional malware from the following URLs.’
- [T1082] System Information Discovery – The malware targets system information like Windows usernames and volume serial numbers as part of its operations: ‘stealing Windows usernames, volume serial numbers.’
Indicators of Compromise
- [URL] hxxp[:]//45.83.122[.]33/admin/wevtutil[.]exe – Malware distribution URL
- [URL] hxxp[:]//45.83.122[.]33/admin/Microsoft.AppV.AppVClientWmi[.]exe – Malware distribution URL
- [URL] hxxp[:]//45.83.122[.]33/admin/avicap32[.]exe – Malware distribution URL
- [IP] 45.83.122.33 – used in distribution URLs
- [File] wevtutil.exe – SystemBC RAT component
- [File] AppVClientWmi.exe – RecordBreaker (Raccoon Stealer 2.0)
- [File] avicap32.exe – Laplas Clipper
- [Hash] 825a7c6d1b4adfe2b1cc7b29199f5033 – SmokeLoader
- [Hash] 457c9934ea081a6594d8f630ef5a9460 – SystemBC RAT
- [Hash] 7f9a14f5eb35f5edd11624abfafba8f0 – RecordBreaker
- [Hash] e5bc55ce98909742d2f1353b3bc8749ecc71206a5b8fa2e656d2a3ae186c1e63 – Laplas Clipper
- [Hash] b76188bafa717975768bd24d09ffeb09 – Laplas Clipper
- [URL] hxxp[:]//clipper[.]guru/bot/online?guid=DESKTOP-[Redacted]&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 – C2 online check
- [URL] hxxp[:]//clipper[.]guru/bot/get?address=0x5B28638188D7D9be3cAfE4EB72D978a909a70466&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 – TA wallet address retrieval
- [URL] hxxp[:]//clipper[.]guru/bot/regex?key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 – Regex pattern download
Read more: https://blog.cyble.com/2022/11/02/new-laplas-clipper-distributed-by-smokeloader/