New MortalKombat ransomware and Laplas Clipper malware threats deployed in financially motivated campaign
Common Information
Type Value
UUID d4e7b84a-796d-418a-b2ad-ed8dc1ec84fd
Fingerprint a530b8b90c7f8e0d
Analysis status DONE
Considered CTI value 2
Text language
Published Feb. 14, 2023, 8:02 a.m.
Added to db Feb. 14, 2023, 2:53 p.m.
Last updated Nov. 17, 2024, 10:40 p.m.
Headline Cisco Talos Intelligence Blog
Title New MortalKombat ransomware and Laplas Clipper malware threats deployed in financially motivated campaign
Detected Hints/Tags/Attributes 102/4/30
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 68 Cisco Talos Blog https://blog.talosintelligence.com/rss/ 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 5
coinpayments.net
Details Domain 74
proton.me
Details Domain 8
laplas.app
Details Domain 71
transfer.sh
Details Domain 5
clipper.guru
Details Domain 904
snort.org
Details Email 3
noreply@coinpayments.net
Details Email 2
hack3dlikeapro@proton.me
Details File 95
pdf.exe
Details File 1
e7okc9s3llhad13.exe
Details File 140
files.txt
Details File 1
tcobaiszyl.exe
Details File 2126
cmd.exe
Details File 6
win.inf
Details File 3
downloader.vbs
Details IPv4 3
193.169.255.78
Details IPv4 13
144.76.136.153
Details MITRE ATT&CK Techniques 695
T1059
Details MITRE ATT&CK Techniques 80
T1064
Details MITRE ATT&CK Techniques 239
T1106
Details MITRE ATT&CK Techniques 40
T1197
Details MITRE ATT&CK Techniques 279
T1060
Details MITRE ATT&CK Techniques 550
T1112
Details MITRE ATT&CK Techniques 1006
T1082
Details MITRE ATT&CK Techniques 585
T1083
Details MITRE ATT&CK Techniques 501
T1012
Details MITRE ATT&CK Techniques 188
T1120
Details MITRE ATT&CK Techniques 22
T1048.003
Details MITRE ATT&CK Techniques 472
T1486
Details Url 1
https://laplas.app