General

  • Target

    5b46786e8b21decf3c37cd22683d79f9_JaffaCakes118

  • Size

    262KB

  • Sample

    240719-k1jlraweph

  • MD5

    5b46786e8b21decf3c37cd22683d79f9

  • SHA1

    8e30e3313ad2149959ba4c4eb6a4652afb140413

  • SHA256

    afb976855a579c48d62c6ae4ea7e2c52b7c9a651c25ae999c38cac1f10b16a06

  • SHA512

    00c791eff9a69d7b249d3b1bd2f8aa6095a8380f24e20c85cf20154dc747d51a5380fa6b6a77d37704ae7308b04f0b412c900cf395d9164a0407dcb62fe88228

  • SSDEEP

    6144:WZANI8hAiQIPClbtwdGd2mJjzDNwAAzQ9:7C8hqtwde2m5P6tzO

Malware Config

Extracted

Family

latentbot

C2

kankabengeldim.zapto.org

Targets

    • Target

      5b46786e8b21decf3c37cd22683d79f9_JaffaCakes118

    • Size

      262KB

    • MD5

      5b46786e8b21decf3c37cd22683d79f9

    • SHA1

      8e30e3313ad2149959ba4c4eb6a4652afb140413

    • SHA256

      afb976855a579c48d62c6ae4ea7e2c52b7c9a651c25ae999c38cac1f10b16a06

    • SHA512

      00c791eff9a69d7b249d3b1bd2f8aa6095a8380f24e20c85cf20154dc747d51a5380fa6b6a77d37704ae7308b04f0b412c900cf395d9164a0407dcb62fe88228

    • SSDEEP

      6144:WZANI8hAiQIPClbtwdGd2mJjzDNwAAzQ9:7C8hqtwde2m5P6tzO

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks