General

  • Target

    5a7a2143b1af1c765c4771c8eb218d7a_JaffaCakes118

  • Size

    568KB

  • Sample

    240719-e59e3swdld

  • MD5

    5a7a2143b1af1c765c4771c8eb218d7a

  • SHA1

    44bff0051333b9f0b11e92334c52139e848a64cd

  • SHA256

    e712e370e41df79390877580930f72642efe97a874730e3eb87184356faa3b15

  • SHA512

    0e0ba548d938f38ba6059df0a007edb074a32639e6d1ccdd93fdea544975892febfeb9aceae0a436fa02b4ef09649b61a0163c282106dcfebcf833f7c038349a

  • SSDEEP

    12288:o3nZMhJ+ubNWSPcxMSaMlZFm88t52CDR0d8sOLKDSOby7:o3nZqfbNPcW22Jt5BDRXsOLYSObU

Malware Config

Extracted

Family

latentbot

C2

1microsoftx.zapto.org

2microsoftx.zapto.org

3microsoftx.zapto.org

4microsoftx.zapto.org

5microsoftx.zapto.org

6microsoftx.zapto.org

7microsoftx.zapto.org

8microsoftx.zapto.org

Targets

    • Target

      5a7a2143b1af1c765c4771c8eb218d7a_JaffaCakes118

    • Size

      568KB

    • MD5

      5a7a2143b1af1c765c4771c8eb218d7a

    • SHA1

      44bff0051333b9f0b11e92334c52139e848a64cd

    • SHA256

      e712e370e41df79390877580930f72642efe97a874730e3eb87184356faa3b15

    • SHA512

      0e0ba548d938f38ba6059df0a007edb074a32639e6d1ccdd93fdea544975892febfeb9aceae0a436fa02b4ef09649b61a0163c282106dcfebcf833f7c038349a

    • SSDEEP

      12288:o3nZMhJ+ubNWSPcxMSaMlZFm88t52CDR0d8sOLKDSOby7:o3nZqfbNPcW22Jt5BDRXsOLYSObU

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies firewall policy service

    • UAC bypass

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks