General

  • Target

    418c7dcc38bc4856f00a6e0067774ec4_JaffaCakes118

  • Size

    115KB

  • Sample

    241013-xpzj2ssglb

  • MD5

    418c7dcc38bc4856f00a6e0067774ec4

  • SHA1

    95b6baecca24bcfc2a366230cd6b7597361b5f73

  • SHA256

    16ca6ef3a3dafa34c5fa0c1ac6db90d7f3744277dacec41ac100f46f35d59674

  • SHA512

    75edb83a575545dc326d38d12249740fb5e2fc2d184d4707deda5eaf5e35805a43b3baf6fa9740230e6e1ac27df0d6583a315f025d9054f25195baf5129d58da

  • SSDEEP

    3072:b0kW3A7V8ET+Bd341KDvq7UPIPuROerYORIkFyLdKr:zTCEqH3UKDC7U+uBrYOKM/r

Malware Config

Extracted

Family

latentbot

C2

bethwithsdaltonlaw.zapto.org

Targets

    • Target

      418c7dcc38bc4856f00a6e0067774ec4_JaffaCakes118

    • Size

      115KB

    • MD5

      418c7dcc38bc4856f00a6e0067774ec4

    • SHA1

      95b6baecca24bcfc2a366230cd6b7597361b5f73

    • SHA256

      16ca6ef3a3dafa34c5fa0c1ac6db90d7f3744277dacec41ac100f46f35d59674

    • SHA512

      75edb83a575545dc326d38d12249740fb5e2fc2d184d4707deda5eaf5e35805a43b3baf6fa9740230e6e1ac27df0d6583a315f025d9054f25195baf5129d58da

    • SSDEEP

      3072:b0kW3A7V8ET+Bd341KDvq7UPIPuROerYORIkFyLdKr:zTCEqH3UKDC7U+uBrYOKM/r

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • STRRAT

      STRRAT is a remote access tool than can steal credentials and log keystrokes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks