General

  • Target

    PrintViewer.msi

  • Size

    6.7MB

  • Sample

    240925-2ehwrs1eqk

  • MD5

    85f914ec316e8d20e8e13ef3719e04e4

  • SHA1

    86ec276d409525bd8c1ef6d47ec8eece7639c0a2

  • SHA256

    00ceea629efd7eb1d9eee5706ce8089336259c099fc4af274baf857bd1ddf230

  • SHA512

    6a9eebfd6b4e794ab1fd949fa2093559460390a1d7843484e2086145e2ae968d8c347a3b3392aab2ebc41463cf97a3d36b23b6e8f80000949bb66c8eff3ba4e6

  • SSDEEP

    98304:57vB+ZHiEZJMuI9JqwLOO+lzsnMHDqqxLSd7qqXR2EkLus6elw5Xe21NtcP33h3u:5IiiJiTqwLOTsMHDHBAI8kcXvWP1u

Malware Config

Extracted

Family

latentbot

C2

besthard2024.zapto.org

Targets

    • Target

      PrintViewer.msi

    • Size

      6.7MB

    • MD5

      85f914ec316e8d20e8e13ef3719e04e4

    • SHA1

      86ec276d409525bd8c1ef6d47ec8eece7639c0a2

    • SHA256

      00ceea629efd7eb1d9eee5706ce8089336259c099fc4af274baf857bd1ddf230

    • SHA512

      6a9eebfd6b4e794ab1fd949fa2093559460390a1d7843484e2086145e2ae968d8c347a3b3392aab2ebc41463cf97a3d36b23b6e8f80000949bb66c8eff3ba4e6

    • SSDEEP

      98304:57vB+ZHiEZJMuI9JqwLOO+lzsnMHDqqxLSd7qqXR2EkLus6elw5Xe21NtcP33h3u:5IiiJiTqwLOTsMHDHBAI8kcXvWP1u

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies Windows Firewall

MITRE ATT&CK Enterprise v15

Tasks