General

  • Target

    6723653391970.vbs

  • Size

    2KB

  • Sample

    241031-neacqsxelp

  • MD5

    8d36763727659594c5481673a560d80c

  • SHA1

    227412dd9a84be814117efa39544dfb173cc3b73

  • SHA256

    6b16c2a1897f02f6f05f97ffcadd357071dc660708312b5c71341f9bb4bc285a

  • SHA512

    69112847ed21383ce014a80af448e731b92199637b9511bcc509026cefae1dbc44a05a7849e865b72a8ca48a5e6c527d7236241b55debd7c9a27306c967f0c1e

Malware Config

Targets

    • Target

      6723653391970.vbs

    • Size

      2KB

    • MD5

      8d36763727659594c5481673a560d80c

    • SHA1

      227412dd9a84be814117efa39544dfb173cc3b73

    • SHA256

      6b16c2a1897f02f6f05f97ffcadd357071dc660708312b5c71341f9bb4bc285a

    • SHA512

      69112847ed21383ce014a80af448e731b92199637b9511bcc509026cefae1dbc44a05a7849e865b72a8ca48a5e6c527d7236241b55debd7c9a27306c967f0c1e

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Blocklisted process makes network request

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks