General

  • Target

    eef68640f3b78e042fba7f45a518e9c3_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240921-dnwl8ascrg

  • MD5

    eef68640f3b78e042fba7f45a518e9c3

  • SHA1

    f2170f4abbcf3d09b53d9a6ed146d8595fa4e96c

  • SHA256

    15e253cfeaecd2ef2536032ee0d338b76537d1e93d25c6369fbfa2a527b3fa43

  • SHA512

    2f6acf3d2147761eea52168b8418296969acd228c4f26be4cfcb64d5a3dd5a61be71e371a05eb047000c99ef766e83b12b500ea2d78c554f94bb76ac13489c93

  • SSDEEP

    12288:o7qYxucwN74XguniSTsrHGyKWUxUHeC7/wazIQNcF8r/X0SCu77AX:oSc9XguniGiNhsCIQu8rcSC8kX

Malware Config

Extracted

Family

latentbot

C2

ewertontoom.zapto.org

Targets

    • Target

      eef68640f3b78e042fba7f45a518e9c3_JaffaCakes118

    • Size

      2.0MB

    • MD5

      eef68640f3b78e042fba7f45a518e9c3

    • SHA1

      f2170f4abbcf3d09b53d9a6ed146d8595fa4e96c

    • SHA256

      15e253cfeaecd2ef2536032ee0d338b76537d1e93d25c6369fbfa2a527b3fa43

    • SHA512

      2f6acf3d2147761eea52168b8418296969acd228c4f26be4cfcb64d5a3dd5a61be71e371a05eb047000c99ef766e83b12b500ea2d78c554f94bb76ac13489c93

    • SSDEEP

      12288:o7qYxucwN74XguniSTsrHGyKWUxUHeC7/wazIQNcF8r/X0SCu77AX:oSc9XguniGiNhsCIQu8rcSC8kX

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies WinLogon for persistence

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks