General

  • Target

    00ed479a140d88f91796423f840fea8a_JaffaCakes118

  • Size

    279KB

  • Sample

    240930-mvz3na1bqn

  • MD5

    00ed479a140d88f91796423f840fea8a

  • SHA1

    52a0675dba09ea9d8d0c4d1647ac7b201941df37

  • SHA256

    5ca81371c33e6302693fa24496d796188eb5bfa45e0901c3d6b9841c400a4d3b

  • SHA512

    dcf2e28f0895ab0f9970d88c5a168463af4edc700bafa860703d1794ab773e7e86ccf395b825990eb5b60d1c64dd0cc57f3f87606bdb5ee3b776e15e9a4be913

  • SSDEEP

    6144:Bt3Bt/i7mD9EtBzdedpKRgqjaCq8GdZuvDyIKiL:y7mZEtJ2KiqOCvlrr

Malware Config

Extracted

Family

latentbot

C2

atualizador.zapto.org

Targets

    • Target

      00ed479a140d88f91796423f840fea8a_JaffaCakes118

    • Size

      279KB

    • MD5

      00ed479a140d88f91796423f840fea8a

    • SHA1

      52a0675dba09ea9d8d0c4d1647ac7b201941df37

    • SHA256

      5ca81371c33e6302693fa24496d796188eb5bfa45e0901c3d6b9841c400a4d3b

    • SHA512

      dcf2e28f0895ab0f9970d88c5a168463af4edc700bafa860703d1794ab773e7e86ccf395b825990eb5b60d1c64dd0cc57f3f87606bdb5ee3b776e15e9a4be913

    • SSDEEP

      6144:Bt3Bt/i7mD9EtBzdedpKRgqjaCq8GdZuvDyIKiL:y7mZEtJ2KiqOCvlrr

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks