General

  • Target

    2121111dea986c74e5ba210bfa80f70009bc12e0e109a4b977632b331937093b

  • Size

    2.6MB

  • Sample

    241102-a3lh1symhm

  • MD5

    9d233f652a6e144f60e17ea1d76cd429

  • SHA1

    3cd5ea7421887006af988ead808f308d2d67f21f

  • SHA256

    2121111dea986c74e5ba210bfa80f70009bc12e0e109a4b977632b331937093b

  • SHA512

    74875d3641279eaf5b2842d9b51ea21f5e975d995b6c14dc0d3c9628ec13ca9d2ddd7657b7e3ebb585566df0d449e41a749220e7f898ec972566faf5ebc5e09e

  • SSDEEP

    49152:I0Pl/+hps8xkx9A5NXLtLnl83d71sCOQqTNBPhC6:I0t/+hps/x9A/XJqtRsVNb06

Malware Config

Extracted

Family

latentbot

C2

downloadmanager.zapto.org

Targets

    • Target

      2121111dea986c74e5ba210bfa80f70009bc12e0e109a4b977632b331937093b

    • Size

      2.6MB

    • MD5

      9d233f652a6e144f60e17ea1d76cd429

    • SHA1

      3cd5ea7421887006af988ead808f308d2d67f21f

    • SHA256

      2121111dea986c74e5ba210bfa80f70009bc12e0e109a4b977632b331937093b

    • SHA512

      74875d3641279eaf5b2842d9b51ea21f5e975d995b6c14dc0d3c9628ec13ca9d2ddd7657b7e3ebb585566df0d449e41a749220e7f898ec972566faf5ebc5e09e

    • SSDEEP

      49152:I0Pl/+hps8xkx9A5NXLtLnl83d71sCOQqTNBPhC6:I0t/+hps/x9A/XJqtRsVNb06

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks