General

  • Target

    687caf067849f388fbe442a4c2650765_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240723-vsqp7stckf

  • MD5

    687caf067849f388fbe442a4c2650765

  • SHA1

    1e80d2bd0005f4a2f43c7ebf246a6922c667898e

  • SHA256

    fe755742c5e65ce96b1c21e84bec688153d7bae1a89d4e3299a5802fec5805da

  • SHA512

    e823441bdf42099ff521ebbf5187733801e79eb447f6ee55d6fc333066313881ed2404d1a53b8db469d5be7c4f37e10bf21ae307d8824e314c0b3da0c238685f

  • SSDEEP

    24576:0E2hlP2AQ94zrk0TjO0duGNHbQXGR50393DsJgWRV:REPYV0G47Q2R50tzsBRV

Malware Config

Extracted

Family

latentbot

C2

diretoriawow.zapto.org

Targets

    • Target

      687caf067849f388fbe442a4c2650765_JaffaCakes118

    • Size

      1.1MB

    • MD5

      687caf067849f388fbe442a4c2650765

    • SHA1

      1e80d2bd0005f4a2f43c7ebf246a6922c667898e

    • SHA256

      fe755742c5e65ce96b1c21e84bec688153d7bae1a89d4e3299a5802fec5805da

    • SHA512

      e823441bdf42099ff521ebbf5187733801e79eb447f6ee55d6fc333066313881ed2404d1a53b8db469d5be7c4f37e10bf21ae307d8824e314c0b3da0c238685f

    • SSDEEP

      24576:0E2hlP2AQ94zrk0TjO0duGNHbQXGR50393DsJgWRV:REPYV0G47Q2R50tzsBRV

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies WinLogon for persistence

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Modifies WinLogon

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks