General

  • Target

    f654851c10b036e7d4fa08f5e7dd58b8_JaffaCakes118

  • Size

    548KB

  • Sample

    240925-s4tvwstbqm

  • MD5

    f654851c10b036e7d4fa08f5e7dd58b8

  • SHA1

    ce9f58f7a83743d680dfa01747b44d00fd873b32

  • SHA256

    c7d0fdb9f862ade43651501151792412ed9edb0a9fc9076256a379bad5e91f69

  • SHA512

    cd2a57c9cbb77ad01dbc90e3d29dcabdce9ce629a775dc12f340b81fd33c5ee8b2b2c546e22d4c678733c54a54cb2407ca62745c7f40fe7a15f5d7a75fe380f9

  • SSDEEP

    12288:Mp7t+hiD9Y27bVIuZeUEXhcWp19xTdkx2O5IVh0ysu1pWJNsD0gZ3u:UEiD9YAJXoUEXhcQ1Xax2WIVOLunWJN8

Malware Config

Extracted

Family

latentbot

C2

nyandcompany.zapto.org

1nyandcompany.zapto.org

2nyandcompany.zapto.org

3nyandcompany.zapto.org

4nyandcompany.zapto.org

5nyandcompany.zapto.org

6nyandcompany.zapto.org

7nyandcompany.zapto.org

8nyandcompany.zapto.org

Targets

    • Target

      f654851c10b036e7d4fa08f5e7dd58b8_JaffaCakes118

    • Size

      548KB

    • MD5

      f654851c10b036e7d4fa08f5e7dd58b8

    • SHA1

      ce9f58f7a83743d680dfa01747b44d00fd873b32

    • SHA256

      c7d0fdb9f862ade43651501151792412ed9edb0a9fc9076256a379bad5e91f69

    • SHA512

      cd2a57c9cbb77ad01dbc90e3d29dcabdce9ce629a775dc12f340b81fd33c5ee8b2b2c546e22d4c678733c54a54cb2407ca62745c7f40fe7a15f5d7a75fe380f9

    • SSDEEP

      12288:Mp7t+hiD9Y27bVIuZeUEXhcWp19xTdkx2O5IVh0ysu1pWJNsD0gZ3u:UEiD9YAJXoUEXhcQ1Xax2WIVOLunWJN8

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks