General

  • Target

    4cbc8f2138bd0c39befba55b09c65b7f_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240716-enpdksxblc

  • MD5

    4cbc8f2138bd0c39befba55b09c65b7f

  • SHA1

    9bbdea4451de2f6290cdbc82ceabb180af50dde9

  • SHA256

    460044126526dd41770a433cdde95fed48e6580193374d7d294d4658f41547ae

  • SHA512

    18908f4542f4e1d428e050813824523e8a43ba303442405a249b4653fa027f6b57be9be865c27eed6841c21832c11dee66b7b14bdd9c7bc9e4f223d4271c5e2f

  • SSDEEP

    24576:egHU/TTU/tpm6FE//Tct4bOsTPFh0uq+VullbArmXay:oU/tpmYSVTL/VullbAKKy

Malware Config

Extracted

Family

latentbot

C2

butterkuchen1337.zapto.org

Targets

    • Target

      4cbc8f2138bd0c39befba55b09c65b7f_JaffaCakes118

    • Size

      1.1MB

    • MD5

      4cbc8f2138bd0c39befba55b09c65b7f

    • SHA1

      9bbdea4451de2f6290cdbc82ceabb180af50dde9

    • SHA256

      460044126526dd41770a433cdde95fed48e6580193374d7d294d4658f41547ae

    • SHA512

      18908f4542f4e1d428e050813824523e8a43ba303442405a249b4653fa027f6b57be9be865c27eed6841c21832c11dee66b7b14bdd9c7bc9e4f223d4271c5e2f

    • SSDEEP

      24576:egHU/TTU/tpm6FE//Tct4bOsTPFh0uq+VullbArmXay:oU/tpmYSVTL/VullbAKKy

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks