Various queries for locating potential Laplas Infrastructure. Based on an IP found in a Laplas sample from Malware Bazaar.
The full list can be found at the end of post.
SHA256: 825b0080782dee075f8aac11c3a682f86c5d3aa5462bd16be0ed511a181dd7ba
Links to relevant existing research by OALABS and Chris Duggan. Chris in particular has some work that is very similar to this.
Searching this IP in Shodan reveals a server that redirects to https://laplas[.].app
Searching laplas.app
reveals 27 servers. Each server appears to be a redirector to the main Laplas site.
Searching laplas.app
in Censys reveals 22 servers. Two of which were not in the original Shodan list.
One result 31.42.176[.]127
contains a reference to CN=Laplas.app
. This result appears to be the primary server.
Searching for the common name of laplas.app
does not reveal additional infrastructure. Only the initial result of 31.42.176[.]127
was found.
Of the 22 results with Censys, No other common names were available that could be used for pivoting.
Only one Jarm hash was available. This was a common Jarm fingerprint with around 205K results and hence was not useful for pivoting.
services.jarm.fingerprint=15d3fd16d29d29d00042d43d000000fe02290512647416dcf0a400ccbc0b6b
Complete List of Potential Laplas Stealer Infrastructure
Complete list of IP's based on searches for laplas.app
in both Shodan and Censys.
31.42.176[.]127
37.220.87[.]60
45.81.243[.]208
45.159.188[.]109
45.159.188[.]158
45.159.189[.]33
45.159.189[.]105
65.109.140[.]234
78.153.130[.]208
79.137.195[.]205
79.137.199[.]252
80.85.241[.]66
85.192.40[.]252
85.192.41[.]87
89.23.97[.]128
89.185.85[.]79
95.214.27[.]252
104.193.254[.]40
104.193.255[.]50
163.123.142[.]220
176.113.115[.]25
185.106.92[.]104
185.174.137[.]94
185.209.161[.]89
185.213.208[.]247
185.223.93[.]251
193.188.23[.]86
195.133.75[.]43
212.113.106[.]172
Sign up for Embee Research
Malware Analysis and Threat Intelligence Research
No spam. Unsubscribe anytime.