There were 2,135 press releases posted in the last 24 hours and 412,225 in the last 365 days.

LaplasClipper Malware Analysis from ANY.RUN: retrieving the config

DUBAI, UAE, July 24, 2023/EINPresswire.com/ -- ANY.RUN, a cybersecurity company developing an interactive sandbox analytical platform for malware researchers, presents the LaplasClipper Malware Analysis.

π–π‘πšπ­ 𝐒𝐬 π‹πšπ©π₯πšπ¬π‚π₯𝐒𝐩𝐩𝐞𝐫 𝐦𝐚π₯𝐰𝐚𝐫𝐞?

LaplasClipper, as its name implies, is a clipper variant. Its primary malicious function is to monitor the user’s clipboard (T1115). Attackers typically use it to swap out cryptocurrency addresses with ones they control. When users paste the address into a wallet to transfer funds, it’s the attacker’s address that receives them.

𝐊𝐞𝐲 𝐩𝐨𝐒𝐧𝐭𝐬

ANY.RUN has dissected a fresh malware sample from the LaplasClipper family, developed on the .NET platform and obfuscated using Babel.

In the process of research, ANY.RUN has uncovered the sample’s internal settings, examined some techniques leveraged by the obfuscator to complicate the sample analysis, and outlined strategies to counter them.

ANY.RUN findings provide a solid understanding of the fundamental principles of protective mechanisms on the .NET platform. It’s critical to recognize that even the most complex protective methods rest on basic concepts, which are essential to understand and identify.

Read more with the code & script examples in the article at ANY.RUN.

Vlada Belousova
ANYRUN FZCO
2027889264
email us here
Visit us on social media:
Twitter
YouTube

Legal Disclaimer:

EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.