General

  • Target

    8e0f9ecd88b4b86b7ab049da7ecdabf0_JaffaCakes118

  • Size

    3.0MB

  • Sample

    240812-kk87gaxfqf

  • MD5

    8e0f9ecd88b4b86b7ab049da7ecdabf0

  • SHA1

    ceccbbb032df73e9bc70726283b39ba9f5cf9b06

  • SHA256

    2575d23aa2f37f9e75f0cfc4a28839ffde50c751b410e57170a22132b960819e

  • SHA512

    f1c7bfbb4a5f1ad9b9f269abe37702a5bd83050553614502905db965fea0a4830a17d429d716b954f90252bbb3e387d5d96f432da302b1301b8b0b088a3759e3

  • SSDEEP

    12288:76eVQkTrvj4d+dONGRpz5ljXeLY8Kk5tqGN0GvTBb/A4h75Li:7nQkTf4d+INGxetl0GrBb/A6752

Malware Config

Extracted

Family

latentbot

C2

patrickstar23.zapto.org

1patrickstar23.zapto.org

2patrickstar23.zapto.org

3patrickstar23.zapto.org

4patrickstar23.zapto.org

5patrickstar23.zapto.org

6patrickstar23.zapto.org

7patrickstar23.zapto.org

8patrickstar23.zapto.org

Targets

    • Target

      Falco.Software.Universal.Keygen.v1.0.WinALL.Keygen.Only-BRD.exe

    • Size

      3.0MB

    • MD5

      931f9b49da3148fa20689f77153b59d2

    • SHA1

      e13a0d13be83a6ee19bab2e1ff99276862b043a0

    • SHA256

      635a33bbd24779423e271254e335b860ef9decd8670240da8756d4f05c17a782

    • SHA512

      74be5f81122419a97684493b88e5690e0f9a9e91d975b51fca0e00d838365923092635f47a51e651bb13d5ccd975424343b54a61623c25b10516f7a7527e5710

    • SSDEEP

      12288:a6eVQkTrvj4d+dONGRpz5ljXeLY8Kk5tqGN0GvTBb/A4h75L:anQkTf4d+INGxetl0GrBb/A675

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies firewall policy service

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks