General

  • Target

    baee0f9bf421c883c45232169f34b452_JaffaCakes118

  • Size

    125KB

  • Sample

    240823-jxan1avglq

  • MD5

    baee0f9bf421c883c45232169f34b452

  • SHA1

    f87cf64ebadf9cea8b6ddb7c3fbb151a0b610902

  • SHA256

    51ab52acf44fe469672a8bc675ca71d5121661e7c40018a5cd71abcdf36652d6

  • SHA512

    319f00fdbda61c0525c646195ea177ccfb4442eb3bf7e60a9b9518cbf68770fa206756639aabc97e864e49b32d6e56915f631177ebc41878bf5ed78748bfd5b4

  • SSDEEP

    3072:Y3JgVs2LveVDnjcaO5I0q35gXg8aXO72fkMzpFoZjV:6JgVz2nO5qpeaXSYGV

Malware Config

Extracted

Family

latentbot

C2

ozaneryilmaz.zapto.org

Targets

    • Target

      baee0f9bf421c883c45232169f34b452_JaffaCakes118

    • Size

      125KB

    • MD5

      baee0f9bf421c883c45232169f34b452

    • SHA1

      f87cf64ebadf9cea8b6ddb7c3fbb151a0b610902

    • SHA256

      51ab52acf44fe469672a8bc675ca71d5121661e7c40018a5cd71abcdf36652d6

    • SHA512

      319f00fdbda61c0525c646195ea177ccfb4442eb3bf7e60a9b9518cbf68770fa206756639aabc97e864e49b32d6e56915f631177ebc41878bf5ed78748bfd5b4

    • SSDEEP

      3072:Y3JgVs2LveVDnjcaO5I0q35gXg8aXO72fkMzpFoZjV:6JgVz2nO5qpeaXSYGV

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks