General

  • Target

    3ee9c6693bc1899d9c771876782c5dec_JaffaCakes118

  • Size

    285KB

  • Sample

    240712-z4qlsszhmq

  • MD5

    3ee9c6693bc1899d9c771876782c5dec

  • SHA1

    8271c556e0f60da8cdf7dea9260724edbe0cf664

  • SHA256

    24bf92019649514209d62b7924a6ee188d4a5f8679af9307ee35d8b49480ba14

  • SHA512

    49a4f4350a754206686e349412a479f98768392d0d8eadaff6ecf54db762831c72e0c304a365b7b630a9db001a1bac2f8869d1830a9af97b97fc61848de8da65

  • SSDEEP

    6144:lSXGcCH276GyitKiWbXE2V4Eaebol02eiHOe3WQzPjS78X6kyGda+YUk:rcCHXiEvV46WvGQLX0J+Y1

Malware Config

Extracted

Family

latentbot

C2

mastershaff.zapto.org

Targets

    • Target

      AIM 1x2.exe

    • Size

      714KB

    • MD5

      ee037acc6ced4a2ea99866bd9f5d2531

    • SHA1

      fe02e28cd8a8c3237cf7d958ff1517f52c90faaa

    • SHA256

      c83c1eb034a7688d564cd841c0c6d51e85890df161bf233ae3efee67a29d9cad

    • SHA512

      6370bb8fc8aaa12c92b55f3ade5cd4e93697721ed6bf6da9c1aa4a48b23ccb19a00cf0a8cb3b39581463f2d79b685cbc3cda6168c42de50ab952668aa5684471

    • SSDEEP

      12288:CaAchpWsuVTv7ItY8XljyypHP7cOLBev03hlULsmWZ++09ZcKDVsgdf:TAEENIq8XwyVPQclDq/+WnpsSf

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies WinLogon for persistence

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks