General

  • Target

    d0c36742d411e089d4b6b9bc8578ffa5_JaffaCakes118

  • Size

    43KB

  • Sample

    241207-fmjmdaxlbs

  • MD5

    d0c36742d411e089d4b6b9bc8578ffa5

  • SHA1

    70c7bf91985c0da175e2ea669108592cfa8ff06f

  • SHA256

    d7d8aced222099305275c8fbbe8094c002157a0546fb7f2694316bbe8b4f5d6d

  • SHA512

    6278cdd37d015e5e540f34a12f0320bce9a4f3dac7e42f5ff45e2aa5308c13b86b0f27fc56cf7063dad6ffce4add45712b6aaae196a39fa956ed78d43c2f3127

  • SSDEEP

    768:a4BZf8+T6RxS8sObArq92T62oz501+6HPjH/Qqvtu1KmF2r1Cf4GclevN83QsH+X:tm271PTPKhyCf4BlevtHCCrk

Malware Config

Extracted

Family

latentbot

C2

shayar1999host.zapto.org

Targets

    • Target

      d0c36742d411e089d4b6b9bc8578ffa5_JaffaCakes118

    • Size

      43KB

    • MD5

      d0c36742d411e089d4b6b9bc8578ffa5

    • SHA1

      70c7bf91985c0da175e2ea669108592cfa8ff06f

    • SHA256

      d7d8aced222099305275c8fbbe8094c002157a0546fb7f2694316bbe8b4f5d6d

    • SHA512

      6278cdd37d015e5e540f34a12f0320bce9a4f3dac7e42f5ff45e2aa5308c13b86b0f27fc56cf7063dad6ffce4add45712b6aaae196a39fa956ed78d43c2f3127

    • SSDEEP

      768:a4BZf8+T6RxS8sObArq92T62oz501+6HPjH/Qqvtu1KmF2r1Cf4GclevN83QsH+X:tm271PTPKhyCf4BlevtHCCrk

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks