General

  • Target

    3e5d7f3e28b6066d3f2d51c729f1d61e_JaffaCakes118

  • Size

    552KB

  • Sample

    241013-hgb2fsxhmm

  • MD5

    3e5d7f3e28b6066d3f2d51c729f1d61e

  • SHA1

    51828ce3cac6729e006e354b15111771c2fb1c54

  • SHA256

    b213c6324fa3d030e27f1cee343fb4604b62369984d5f68391e1fe87650f75cf

  • SHA512

    03ded325752d9e5cbeb28b38494c9fe168a6c1f9a2e3092072f26e0e42660443cb66ef1623316c5d48de2dae8e0b48172a163f4c60fd738098aeb7af1a4cc6a9

  • SSDEEP

    12288:N3RFfYqebVjqGQwkDS17rGNrkty0fkhAlmv:N3RFY/jqVw1ErmyFAe

Malware Config

Extracted

Family

latentbot

C2

gniewkowiec0359.zapto.org

Targets

    • Target

      3e5d7f3e28b6066d3f2d51c729f1d61e_JaffaCakes118

    • Size

      552KB

    • MD5

      3e5d7f3e28b6066d3f2d51c729f1d61e

    • SHA1

      51828ce3cac6729e006e354b15111771c2fb1c54

    • SHA256

      b213c6324fa3d030e27f1cee343fb4604b62369984d5f68391e1fe87650f75cf

    • SHA512

      03ded325752d9e5cbeb28b38494c9fe168a6c1f9a2e3092072f26e0e42660443cb66ef1623316c5d48de2dae8e0b48172a163f4c60fd738098aeb7af1a4cc6a9

    • SSDEEP

      12288:N3RFfYqebVjqGQwkDS17rGNrkty0fkhAlmv:N3RFY/jqVw1ErmyFAe

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks