General

  • Target

    archivo3.vbs

  • Size

    24KB

  • Sample

    241203-rpgfksvjaq

  • MD5

    71fece3e0461df9f8fc019c926b66d1e

  • SHA1

    e6a07dd51d0d781bcfc921d43f9fc39051fde4d6

  • SHA256

    1355780e4fa5680c503fc33814110d4ceeaf38e374fa60d02903eaadfc2fafd8

  • SHA512

    7694e1cb3f4b72192cb721a01fac378e8eaa8d1f03dd293f5ffa27ca52967e10ede4734036050a3c84831145eb6c643129eea94796aa3f83bca9d2b2db112c85

  • SSDEEP

    768:vXLWq6+cwbmAQtplUkBP4zKq5cDBMqAkROs:iq6NwKAmn9N4zKq5cJ

Malware Config

Extracted

Family

latentbot

C2

wretched33kinder.zapto.org

Targets

    • Target

      archivo3.vbs

    • Size

      24KB

    • MD5

      71fece3e0461df9f8fc019c926b66d1e

    • SHA1

      e6a07dd51d0d781bcfc921d43f9fc39051fde4d6

    • SHA256

      1355780e4fa5680c503fc33814110d4ceeaf38e374fa60d02903eaadfc2fafd8

    • SHA512

      7694e1cb3f4b72192cb721a01fac378e8eaa8d1f03dd293f5ffa27ca52967e10ede4734036050a3c84831145eb6c643129eea94796aa3f83bca9d2b2db112c85

    • SSDEEP

      768:vXLWq6+cwbmAQtplUkBP4zKq5cDBMqAkROs:iq6NwKAmn9N4zKq5cJ

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks