General

  • Target

    c45ab6184d8eb1407aeb9b4404340be3_JaffaCakes118

  • Size

    371KB

  • Sample

    240827-e6xsnsvdnn

  • MD5

    c45ab6184d8eb1407aeb9b4404340be3

  • SHA1

    205c017e57b403ba2250ca0db48e0f4eb598fa33

  • SHA256

    03c4482ca7fcf996fa0851fadef694fd3eaa7a878dc64d7cc29fe051a9ac066d

  • SHA512

    edf4dd7308de52314e78e84227ee33c1637fbecf23881982329cf1c6c7d360d83b08ac1a06b2f7498eaa50bc5720741f70497e4bfa0405df78d4721598a33b31

  • SSDEEP

    6144:LZqoI1g3rJLCRgJyHxpxA6hz4VPy8SmR7eanY29rzXI:LZqoIsJLCWJyxzkAmBnXBI

Malware Config

Extracted

Family

latentbot

C2

geotradepopov.zapto.org

Targets

    • Target

      c45ab6184d8eb1407aeb9b4404340be3_JaffaCakes118

    • Size

      371KB

    • MD5

      c45ab6184d8eb1407aeb9b4404340be3

    • SHA1

      205c017e57b403ba2250ca0db48e0f4eb598fa33

    • SHA256

      03c4482ca7fcf996fa0851fadef694fd3eaa7a878dc64d7cc29fe051a9ac066d

    • SHA512

      edf4dd7308de52314e78e84227ee33c1637fbecf23881982329cf1c6c7d360d83b08ac1a06b2f7498eaa50bc5720741f70497e4bfa0405df78d4721598a33b31

    • SSDEEP

      6144:LZqoI1g3rJLCRgJyHxpxA6hz4VPy8SmR7eanY29rzXI:LZqoIsJLCWJyxzkAmBnXBI

    • Detect XtremeRAT payload

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks