General

  • Target

    764bd0f47d395a4a3e4abdf501d48402_JaffaCakes118

  • Size

    264KB

  • Sample

    241027-2j257svdpm

  • MD5

    764bd0f47d395a4a3e4abdf501d48402

  • SHA1

    ee6e39714fc6df19d0acf9a1a33494c82080580c

  • SHA256

    f6df2a467533efa9839443780f837572e796f599c8c1549cd8241cacbd531705

  • SHA512

    1edcdc167ca6d35fdfd4a32ad1535649dd49a0389461c498bffed11dfc43ab33d7c3c20dc85759cc87c594c228725f36c578d4e8b37cc11e1c20afcfb35f9969

  • SSDEEP

    6144:PIFqVA0HHhehYho+7VjNuBMNm2vOhxXbn4:k8DuBAOhRn4

Malware Config

Extracted

Family

latentbot

C2

rsbotsoultions.zapto.org

1rsbotsoultions.zapto.org

2rsbotsoultions.zapto.org

3rsbotsoultions.zapto.org

4rsbotsoultions.zapto.org

5rsbotsoultions.zapto.org

6rsbotsoultions.zapto.org

7rsbotsoultions.zapto.org

Targets

    • Target

      764bd0f47d395a4a3e4abdf501d48402_JaffaCakes118

    • Size

      264KB

    • MD5

      764bd0f47d395a4a3e4abdf501d48402

    • SHA1

      ee6e39714fc6df19d0acf9a1a33494c82080580c

    • SHA256

      f6df2a467533efa9839443780f837572e796f599c8c1549cd8241cacbd531705

    • SHA512

      1edcdc167ca6d35fdfd4a32ad1535649dd49a0389461c498bffed11dfc43ab33d7c3c20dc85759cc87c594c228725f36c578d4e8b37cc11e1c20afcfb35f9969

    • SSDEEP

      6144:PIFqVA0HHhehYho+7VjNuBMNm2vOhxXbn4:k8DuBAOhRn4

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks