General

  • Target

    f43933b50fd0bfc96da5a0e2e4a12973_JaffaCakes118

  • Size

    771KB

  • Sample

    241215-qrhkzsxkhr

  • MD5

    f43933b50fd0bfc96da5a0e2e4a12973

  • SHA1

    6d3b255a352901a2bd5bc24a015e6a07b50e4d3b

  • SHA256

    f5f424d1dd1dbb7ad82b9f202b5a3d526635d5428add023c6a72d720e96000ce

  • SHA512

    9c6236e7d407713777621afad96b1ad0ab50d9a1eba3573c3e22de7a20ed271f045122f23562436eb8a618fc6869591f7e515b7d1ce3959b62f4c4bee8aeda12

  • SSDEEP

    24576:wEvm150IWxOjgE5XiaMturF8EamIo2f0wm+EfU4n:wEy5t5XCwhzI70wL6U4n

Malware Config

Extracted

Family

latentbot

C2

turkojan4hacker.zapto.org

Targets

    • Target

      f43933b50fd0bfc96da5a0e2e4a12973_JaffaCakes118

    • Size

      771KB

    • MD5

      f43933b50fd0bfc96da5a0e2e4a12973

    • SHA1

      6d3b255a352901a2bd5bc24a015e6a07b50e4d3b

    • SHA256

      f5f424d1dd1dbb7ad82b9f202b5a3d526635d5428add023c6a72d720e96000ce

    • SHA512

      9c6236e7d407713777621afad96b1ad0ab50d9a1eba3573c3e22de7a20ed271f045122f23562436eb8a618fc6869591f7e515b7d1ce3959b62f4c4bee8aeda12

    • SSDEEP

      24576:wEvm150IWxOjgE5XiaMturF8EamIo2f0wm+EfU4n:wEy5t5XCwhzI70wL6U4n

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks