General

  • Target

    2ec0ba70a24a523cee42f7cfa3fde093_JaffaCakes118

  • Size

    657KB

  • Sample

    240709-dd53xasfrp

  • MD5

    2ec0ba70a24a523cee42f7cfa3fde093

  • SHA1

    efc6ed6afa39c48701aaad915c7247800c2fc423

  • SHA256

    1d82eb685802be249d22545fef8ac55cd79ff5469d0e92162260aeab6847bf15

  • SHA512

    141f87655c8e947181b13c17dec5ae9fd046c57748989412a1af4c2c751d793a8a00aed2b9ffab8206aba79330dbb7cbbc7f01c696755b1e590871c9907c0186

  • SSDEEP

    12288:Eg5whZRvIvN6jj03BuaHH8lRAZ2b5g/jAzOrj+mDkFqNmFl4fk9MzVCPuOIPD38s:C0RgHticAf

Malware Config

Extracted

Family

latentbot

C2

darkcomet74663.zapto.org

Targets

    • Target

      2ec0ba70a24a523cee42f7cfa3fde093_JaffaCakes118

    • Size

      657KB

    • MD5

      2ec0ba70a24a523cee42f7cfa3fde093

    • SHA1

      efc6ed6afa39c48701aaad915c7247800c2fc423

    • SHA256

      1d82eb685802be249d22545fef8ac55cd79ff5469d0e92162260aeab6847bf15

    • SHA512

      141f87655c8e947181b13c17dec5ae9fd046c57748989412a1af4c2c751d793a8a00aed2b9ffab8206aba79330dbb7cbbc7f01c696755b1e590871c9907c0186

    • SSDEEP

      12288:Eg5whZRvIvN6jj03BuaHH8lRAZ2b5g/jAzOrj+mDkFqNmFl4fk9MzVCPuOIPD38s:C0RgHticAf

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks