General

  • Target

    4008d944bb4485acce770a431b395ba0_JaffaCakes118

  • Size

    295KB

  • Sample

    240713-d5l44swfje

  • MD5

    4008d944bb4485acce770a431b395ba0

  • SHA1

    5feca63cf3d3d2a0ef623fe9a56f76da5f238519

  • SHA256

    6f6113b1d0fe8aa2a498ef3eee730f3671053bbcfa6f278a346e282e0456168b

  • SHA512

    a9b5e3ad27d5866abfa28f2913dc14244757367dc4e7e9ba56bf4dcc4395eabb9b50943f8eab7fc885868d2ee547d6b96c1c9909207bf71e37ea8bde09c00353

  • SSDEEP

    6144:0soOO2JucbF9AwphUegCEe9dbAOSFGQQytBWoL:voan9AuhrwGAOSFUYL

Malware Config

Extracted

Family

latentbot

C2

propagandagreifing.zapto.org

Targets

    • Target

      4008d944bb4485acce770a431b395ba0_JaffaCakes118

    • Size

      295KB

    • MD5

      4008d944bb4485acce770a431b395ba0

    • SHA1

      5feca63cf3d3d2a0ef623fe9a56f76da5f238519

    • SHA256

      6f6113b1d0fe8aa2a498ef3eee730f3671053bbcfa6f278a346e282e0456168b

    • SHA512

      a9b5e3ad27d5866abfa28f2913dc14244757367dc4e7e9ba56bf4dcc4395eabb9b50943f8eab7fc885868d2ee547d6b96c1c9909207bf71e37ea8bde09c00353

    • SSDEEP

      6144:0soOO2JucbF9AwphUegCEe9dbAOSFGQQytBWoL:voan9AuhrwGAOSFUYL

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks