General

  • Target

    5e8acf5ec31ff19535059327079314d7_JaffaCakes118

  • Size

    744KB

  • Sample

    240720-b2ql1sthkh

  • MD5

    5e8acf5ec31ff19535059327079314d7

  • SHA1

    783e71eec65d29ead303e8f647918fb20675d354

  • SHA256

    43b05ba8653943e98321f3708dc7f24c6652eee6138725f6a41145d45679995c

  • SHA512

    4f168e4bae2edfa732f90d93c04931dbb0fe4a3fa7484c075906cd243489c9bd84c15eab2bd032a192c51e684f028e5171c972935c8160b545a6f72a50a7c0c2

  • SSDEEP

    12288:T8UaT9XY2siA0bMG09xD7I3Gg8ecgVvfBoCDBOQQYbVXpuy1f/gORixib:wUKoN0bUxgGa/pfBHDb+y1HgZo

Malware Config

Extracted

Family

latentbot

C2

rustyslaves.zapto.org

Targets

    • Target

      5e8acf5ec31ff19535059327079314d7_JaffaCakes118

    • Size

      744KB

    • MD5

      5e8acf5ec31ff19535059327079314d7

    • SHA1

      783e71eec65d29ead303e8f647918fb20675d354

    • SHA256

      43b05ba8653943e98321f3708dc7f24c6652eee6138725f6a41145d45679995c

    • SHA512

      4f168e4bae2edfa732f90d93c04931dbb0fe4a3fa7484c075906cd243489c9bd84c15eab2bd032a192c51e684f028e5171c972935c8160b545a6f72a50a7c0c2

    • SSDEEP

      12288:T8UaT9XY2siA0bMG09xD7I3Gg8ecgVvfBoCDBOQQYbVXpuy1f/gORixib:wUKoN0bUxgGa/pfBHDb+y1HgZo

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies WinLogon for persistence

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks