General

  • Target

    76a392b9e2d66b5eba6997161c8716ce_JaffaCakes118

  • Size

    238KB

  • Sample

    241028-ab39ratjbv

  • MD5

    76a392b9e2d66b5eba6997161c8716ce

  • SHA1

    c26d06da6f6845d5aab68968931566bd58fb872b

  • SHA256

    f0f186bdc567e32ffd0b3cd00ceb6fdc7a9caf9650e2cc9a73309c6718b1f756

  • SHA512

    1155401567288b7bca66ebb217523a5ea19b04530ed06dc3346a3d615131cd0f51ef3e251fe80add2674f6f80ec9eb7242f66fd9f52266039f1ce949f509a711

  • SSDEEP

    6144:ilC2F8NXC796TB9vj48LyakwBpehd+fdQUzF:iveVQkTrvj4Jtwrehd+fdQ0F

Malware Config

Extracted

Family

latentbot

C2

micos0ftupdate.zapto.org

Targets

    • Target

      76a392b9e2d66b5eba6997161c8716ce_JaffaCakes118

    • Size

      238KB

    • MD5

      76a392b9e2d66b5eba6997161c8716ce

    • SHA1

      c26d06da6f6845d5aab68968931566bd58fb872b

    • SHA256

      f0f186bdc567e32ffd0b3cd00ceb6fdc7a9caf9650e2cc9a73309c6718b1f756

    • SHA512

      1155401567288b7bca66ebb217523a5ea19b04530ed06dc3346a3d615131cd0f51ef3e251fe80add2674f6f80ec9eb7242f66fd9f52266039f1ce949f509a711

    • SSDEEP

      6144:ilC2F8NXC796TB9vj48LyakwBpehd+fdQUzF:iveVQkTrvj4Jtwrehd+fdQ0F

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks