General

  • Target

    5647eaaab2fdb519ee6dfa37c41ed4bc_JaffaCakes118

  • Size

    1.6MB

  • Sample

    241018-jscb2aybmp

  • MD5

    5647eaaab2fdb519ee6dfa37c41ed4bc

  • SHA1

    e4a8d404159f195dd0f697d54c7048f7a1052f6d

  • SHA256

    ea82fd18e2bc55984294a2f16f5fa56c6f6917cfd11b7199934a5f2ae3957f98

  • SHA512

    41929071f4f2a284b3229b15359cacf5a84c8320913438fe49f950b0403e1b67af56e8459cc2a780eaa8206d729fdf8c88a966fbda0d38ce1434e25404fd18a7

  • SSDEEP

    49152:dNHe8fAIwgw4lAAx9BhmaCldEbi0z2sD9XYxfXCogCbF51+/ng6g/tu7jbCIeI:/He8fAIwgw4lAAx9Bhma+4isnBYxfXCz

Malware Config

Extracted

Family

latentbot

C2

dr00wsupden.zapto.org

Targets

    • Target

      5647eaaab2fdb519ee6dfa37c41ed4bc_JaffaCakes118

    • Size

      1.6MB

    • MD5

      5647eaaab2fdb519ee6dfa37c41ed4bc

    • SHA1

      e4a8d404159f195dd0f697d54c7048f7a1052f6d

    • SHA256

      ea82fd18e2bc55984294a2f16f5fa56c6f6917cfd11b7199934a5f2ae3957f98

    • SHA512

      41929071f4f2a284b3229b15359cacf5a84c8320913438fe49f950b0403e1b67af56e8459cc2a780eaa8206d729fdf8c88a966fbda0d38ce1434e25404fd18a7

    • SSDEEP

      49152:dNHe8fAIwgw4lAAx9BhmaCldEbi0z2sD9XYxfXCogCbF51+/ng6g/tu7jbCIeI:/He8fAIwgw4lAAx9Bhma+4isnBYxfXCz

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks