General

  • Target

    f4234fff593d802e5a2b3d6980bc076b_JaffaCakes118

  • Size

    317KB

  • Sample

    240924-vvh35sycnf

  • MD5

    f4234fff593d802e5a2b3d6980bc076b

  • SHA1

    fb1d5f050e612d8dc72c5ca9541364816f1d8dfe

  • SHA256

    b7ab8db0ee6b2779fec8e0d252300cccd077c4febb3d4f34ab75bfbb3e2a2e43

  • SHA512

    76203bc1a8bd78a9f212743e701e04991a949e8dd4ca93ec8136bef31cfeba1d50f77ab6f5fad69ba39ed57aa4c9b7e00eb7f7e8cfb6daebdbe28ae2564be5ab

  • SSDEEP

    6144:eG377xS2Vp2CeiorXhwTBF53hVpcCJJvH73oSa:dr7xS2Vp6FwTjVbJJvHboSa

Malware Config

Extracted

Family

latentbot

C2

dezeninha12.zapto.org

Targets

    • Target

      f4234fff593d802e5a2b3d6980bc076b_JaffaCakes118

    • Size

      317KB

    • MD5

      f4234fff593d802e5a2b3d6980bc076b

    • SHA1

      fb1d5f050e612d8dc72c5ca9541364816f1d8dfe

    • SHA256

      b7ab8db0ee6b2779fec8e0d252300cccd077c4febb3d4f34ab75bfbb3e2a2e43

    • SHA512

      76203bc1a8bd78a9f212743e701e04991a949e8dd4ca93ec8136bef31cfeba1d50f77ab6f5fad69ba39ed57aa4c9b7e00eb7f7e8cfb6daebdbe28ae2564be5ab

    • SSDEEP

      6144:eG377xS2Vp2CeiorXhwTBF53hVpcCJJvH73oSa:dr7xS2Vp6FwTjVbJJvHboSa

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks