General

  • Target

    a4bbbebd9bb26f02a0a7bb7092ac3d06_JaffaCakes118

  • Size

    389KB

  • Sample

    240818-a1rbgswclh

  • MD5

    a4bbbebd9bb26f02a0a7bb7092ac3d06

  • SHA1

    687d705f948a9b7b430a4249eda0544d4b1de676

  • SHA256

    e04e6b24ecce5a89b75aad9da48f41f816754c732a2a0e76b9e90a45ea65f650

  • SHA512

    677dbf0de3d161a97a338989db1403972e0d2e796f8390bfb49969c6ae078230bb83fa9da2b6fd9257aca83ca7d84b2bcda8ab3897e388e661c2baaf2e06bfd1

  • SSDEEP

    6144:BFRaI2EqBP/WsZL1PgLl4w0AidVym0EnarUBYVsceh0EUwUDLDv:TR72EqluswR45JTnaEY2Punwyvv

Malware Config

Extracted

Family

latentbot

C2

backdoor2012.zapto.org

Targets

    • Target

      a4bbbebd9bb26f02a0a7bb7092ac3d06_JaffaCakes118

    • Size

      389KB

    • MD5

      a4bbbebd9bb26f02a0a7bb7092ac3d06

    • SHA1

      687d705f948a9b7b430a4249eda0544d4b1de676

    • SHA256

      e04e6b24ecce5a89b75aad9da48f41f816754c732a2a0e76b9e90a45ea65f650

    • SHA512

      677dbf0de3d161a97a338989db1403972e0d2e796f8390bfb49969c6ae078230bb83fa9da2b6fd9257aca83ca7d84b2bcda8ab3897e388e661c2baaf2e06bfd1

    • SSDEEP

      6144:BFRaI2EqBP/WsZL1PgLl4w0AidVym0EnarUBYVsceh0EUwUDLDv:TR72EqluswR45JTnaEY2Punwyvv

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies WinLogon for persistence

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks