General

  • Target

    4db650303e9c9d5ace7e6ffc8452b6b8_JaffaCakes118

  • Size

    211KB

  • Sample

    241016-tdvvyasbnm

  • MD5

    4db650303e9c9d5ace7e6ffc8452b6b8

  • SHA1

    72039cca4a749905ddf184a1c7b78d57b9785e48

  • SHA256

    870164299b96bb39453fde1cc0875560178ffce36914f8967b27774d97edb8b9

  • SHA512

    208d2ec93f5acf92994520a1297a70dc0e739b3ce46e7e04921b7977b5570451ff81ae714e1a99a053f088cfb5fc07f2782187e9c53b3693ba1452acf679d396

  • SSDEEP

    3072:Knwl6hPc96kRCiP0NCzmo5EUE6sDDRDGIRSQgRUc5Q2U2BAl0:MwI0E64RDRw/W2U2BAl

Malware Config

Extracted

Family

latentbot

C2

omarothman2000.zapto.org

Targets

    • Target

      4db650303e9c9d5ace7e6ffc8452b6b8_JaffaCakes118

    • Size

      211KB

    • MD5

      4db650303e9c9d5ace7e6ffc8452b6b8

    • SHA1

      72039cca4a749905ddf184a1c7b78d57b9785e48

    • SHA256

      870164299b96bb39453fde1cc0875560178ffce36914f8967b27774d97edb8b9

    • SHA512

      208d2ec93f5acf92994520a1297a70dc0e739b3ce46e7e04921b7977b5570451ff81ae714e1a99a053f088cfb5fc07f2782187e9c53b3693ba1452acf679d396

    • SSDEEP

      3072:Knwl6hPc96kRCiP0NCzmo5EUE6sDDRDGIRSQgRUc5Q2U2BAl0:MwI0E64RDRw/W2U2BAl

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks