General

  • Target

    b0afb5aafcd854e65057aadd9a68038b_JaffaCakes118

  • Size

    151KB

  • Sample

    240820-y316ga1fqf

  • MD5

    b0afb5aafcd854e65057aadd9a68038b

  • SHA1

    f00d78240735c8b41653a226769793e719b5b0a4

  • SHA256

    bcbf89fb28d5c4e3b15bcce3dab09988e172da05bf139b01e935799e9ab81292

  • SHA512

    99a0e9155e458160acd1e9a5197ba4d7fbaf55b9d30e74442c532e570e3748bfb20e02b1742fcfb642b6f9f61cbe5f030c1e675e59749bce003f7e6d23eeeff4

  • SSDEEP

    3072:Y/NLxbeN3Z0l+wLslelQgJFlOK4aesYtJ2YYGJqbMi:MNLxbapPwLGehFT4FsYT2Ye

Malware Config

Extracted

Family

latentbot

C2

sdfsadfasdf.zapto.org

Targets

    • Target

      b0afb5aafcd854e65057aadd9a68038b_JaffaCakes118

    • Size

      151KB

    • MD5

      b0afb5aafcd854e65057aadd9a68038b

    • SHA1

      f00d78240735c8b41653a226769793e719b5b0a4

    • SHA256

      bcbf89fb28d5c4e3b15bcce3dab09988e172da05bf139b01e935799e9ab81292

    • SHA512

      99a0e9155e458160acd1e9a5197ba4d7fbaf55b9d30e74442c532e570e3748bfb20e02b1742fcfb642b6f9f61cbe5f030c1e675e59749bce003f7e6d23eeeff4

    • SSDEEP

      3072:Y/NLxbeN3Z0l+wLslelQgJFlOK4aesYtJ2YYGJqbMi:MNLxbapPwLGehFT4FsYT2Ye

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • UAC bypass

    • Adds policy Run key to start application

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks