General

  • Target

    09b735113336a30dbae68b949c9230db_JaffaCakes118

  • Size

    50KB

  • Sample

    240624-veze7asgjb

  • MD5

    09b735113336a30dbae68b949c9230db

  • SHA1

    eeac77fdec2e1edf0f1b419d656104d04e570fe4

  • SHA256

    0c98fa95157a4d17c988a939092cb781bfe145a2ca22c35acb647676e5602c4c

  • SHA512

    b0a3b83a7c48c9149fcc611c1b7ec21f664219462225f0a1cb1b238b4b3e0c786cc0cb3b4327c813fdd132bf946d6708d22531cab81cbf0a21341e9645ee9afb

  • SSDEEP

    1536:/rUUD3CPW/9m6e6mm/ASwwb5+JUgmIW1P:TFDSO/9he69/Xwwb5+JUgg

Malware Config

Extracted

Family

latentbot

C2

sqoepamnenr.zapto.org

Targets

    • Target

      09b735113336a30dbae68b949c9230db_JaffaCakes118

    • Size

      50KB

    • MD5

      09b735113336a30dbae68b949c9230db

    • SHA1

      eeac77fdec2e1edf0f1b419d656104d04e570fe4

    • SHA256

      0c98fa95157a4d17c988a939092cb781bfe145a2ca22c35acb647676e5602c4c

    • SHA512

      b0a3b83a7c48c9149fcc611c1b7ec21f664219462225f0a1cb1b238b4b3e0c786cc0cb3b4327c813fdd132bf946d6708d22531cab81cbf0a21341e9645ee9afb

    • SSDEEP

      1536:/rUUD3CPW/9m6e6mm/ASwwb5+JUgmIW1P:TFDSO/9he69/Xwwb5+JUgg

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks