General

  • Target

    1f515e387041e92f55fda67c641e404c_JaffaCakes118

  • Size

    281KB

  • Sample

    240702-plgaassala

  • MD5

    1f515e387041e92f55fda67c641e404c

  • SHA1

    e5e3f0b8341fe70fdaa2261c05bb038fd2a12ece

  • SHA256

    1813a3cbd2ce370e1cfb072b0e48c198840e3bff70d916dd1094c0a0ce29a897

  • SHA512

    154c7958923169a2bbfd6059e1b6c037a65609f201947fe4f05e13ddb787dbd8a3ee6edf2d07a5c18c4fc206f911e8fa3f0568a1c0769cbcb50e2c80f8631bdd

  • SSDEEP

    6144:j1iJcYtR1HsvpSHY7KoSrfTNBuzZZcA1wnOLrMM4Qov:jkHcpSHY7VSrfT2/czO3HKv

Malware Config

Extracted

Family

latentbot

C2

kckconexant.zapto.org

Targets

    • Target

      1f515e387041e92f55fda67c641e404c_JaffaCakes118

    • Size

      281KB

    • MD5

      1f515e387041e92f55fda67c641e404c

    • SHA1

      e5e3f0b8341fe70fdaa2261c05bb038fd2a12ece

    • SHA256

      1813a3cbd2ce370e1cfb072b0e48c198840e3bff70d916dd1094c0a0ce29a897

    • SHA512

      154c7958923169a2bbfd6059e1b6c037a65609f201947fe4f05e13ddb787dbd8a3ee6edf2d07a5c18c4fc206f911e8fa3f0568a1c0769cbcb50e2c80f8631bdd

    • SSDEEP

      6144:j1iJcYtR1HsvpSHY7KoSrfTNBuzZZcA1wnOLrMM4Qov:jkHcpSHY7VSrfT2/czO3HKv

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks