General

  • Target

    bot.mips.elf

  • Size

    169KB

  • Sample

    250102-aftacaskgt

  • MD5

    cac7a8f8c4b3cd1f2c1bd1f187c617eb

  • SHA1

    3bbe81657aed5d688bda2b3456faab369abf1732

  • SHA256

    d3c7ddef9cacafd02109d8a840fc2c54fbc04cbfb32253f6f08182ef6d06221f

  • SHA512

    2df8eeab046c7d33adecc5a2edadc923985b577cd05dc8775623ebeff0621f8cc44ee7b1bef6ec32bde337f1d4355e1f4b335c35d30633b5d53b17a503dfd3ce

  • SSDEEP

    1536:Cl2JvnXPvLrQuchMJdDNsCK9H1R8cA2iQembSM+xV7TfF+hPyO0Hb/zMt/Y:Cgv/fcwZsCK9VRhAX+bShFSP0HbbMlY

Malware Config

Extracted

Family

latentbot

C2

botnetdolly.zapto.org

Targets

    • Target

      bot.mips.elf

    • Size

      169KB

    • MD5

      cac7a8f8c4b3cd1f2c1bd1f187c617eb

    • SHA1

      3bbe81657aed5d688bda2b3456faab369abf1732

    • SHA256

      d3c7ddef9cacafd02109d8a840fc2c54fbc04cbfb32253f6f08182ef6d06221f

    • SHA512

      2df8eeab046c7d33adecc5a2edadc923985b577cd05dc8775623ebeff0621f8cc44ee7b1bef6ec32bde337f1d4355e1f4b335c35d30633b5d53b17a503dfd3ce

    • SSDEEP

      1536:Cl2JvnXPvLrQuchMJdDNsCK9H1R8cA2iQembSM+xV7TfF+hPyO0Hb/zMt/Y:Cgv/fcwZsCK9VRhAX+bShFSP0HbbMlY

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks