General

  • Target

    00e435496590b9c712d89945b07f6516_JaffaCakes118

  • Size

    678KB

  • Sample

    240930-mnztbazgqm

  • MD5

    00e435496590b9c712d89945b07f6516

  • SHA1

    16e228317389dcf11196e75ad4910a46a9d664de

  • SHA256

    eab44c4bf6f2b14afb77c92fe3b509f33d6195312438d399005422982f33cc16

  • SHA512

    46fb5eb6cdf6b3f2a0861ff6d18c15acd17504a6602ff1caa0d8b57e30b1d9a4075791ed64efac6669158fd5514b98c6bdeebe6fa25873e5971634e3fdb33c46

  • SSDEEP

    12288:TJTFIIhIIIuFKEBIYVMgqtYrsSialzYCvhNxVV0Okcb5L:TSE6YmYgbaxH1l

Malware Config

Extracted

Family

latentbot

C2

tommiserver.zapto.org

Targets

    • Target

      00e435496590b9c712d89945b07f6516_JaffaCakes118

    • Size

      678KB

    • MD5

      00e435496590b9c712d89945b07f6516

    • SHA1

      16e228317389dcf11196e75ad4910a46a9d664de

    • SHA256

      eab44c4bf6f2b14afb77c92fe3b509f33d6195312438d399005422982f33cc16

    • SHA512

      46fb5eb6cdf6b3f2a0861ff6d18c15acd17504a6602ff1caa0d8b57e30b1d9a4075791ed64efac6669158fd5514b98c6bdeebe6fa25873e5971634e3fdb33c46

    • SSDEEP

      12288:TJTFIIhIIIuFKEBIYVMgqtYrsSialzYCvhNxVV0Okcb5L:TSE6YmYgbaxH1l

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks