General

  • Target

    50f79abc62be4830a98766176a43043e_JaffaCakes118

  • Size

    123KB

  • Sample

    241017-gpnjsaveqg

  • MD5

    50f79abc62be4830a98766176a43043e

  • SHA1

    98bd99400abaabe80b12a706a2e22ee074726964

  • SHA256

    e4f6be3f15daf268816a595f4bbbfbfaaf349034bb96b59757fa356c0fe8cc99

  • SHA512

    535f7b89362bb13b0478c2d6caf306ac2db4b636774a1c606afba2bec6c43600eb1c2236385994a4810c245e1009f4e9dff842629e37d9ddc26206324a1dd0e0

  • SSDEEP

    1536:QvqTpgKm4JVHPzjHmjBY34pdQkYWnk/VC/6kfQb9bvQ7kYUa4AcX1fU5JXPf79Hq:Qv2CwyF6Ck/VyFfk/YUa4AcX1aBzApL

Malware Config

Extracted

Family

latentbot

C2

freeburakturko.zapto.org

Targets

    • Target

      free_skins.exe

    • Size

      133KB

    • MD5

      9b348250e32f3b0cf5d738b2c108c46e

    • SHA1

      604bb6adde8cc83d12a06b75b9b0ad93ad4ca5b6

    • SHA256

      d3f10e3b0e3971ebedbecdeb79116e4f8b81c6221a6aa5d150241d999e2b1de5

    • SHA512

      0f5dcc373365bcd6ee9272419139725e6ab24b504337dbd95c9b5029694733a4595c62a3778d1a1d496bca8d5032a8a3e9d7efb66e6a9ebde40f4439e8b9ecdf

    • SSDEEP

      3072:+1+MJKrUnFYY5z1i0Nmbi5fJBNolVQy5XoZNM++doutDW9r:GIrPj0NmWtNOJ5XdoSK9r

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks