General

  • Target

    JaffaCakes118_632c6351bebc9946da445bc99409abb2

  • Size

    1.2MB

  • Sample

    250102-g2sn9sxmhw

  • MD5

    632c6351bebc9946da445bc99409abb2

  • SHA1

    a6b1153b51624d75101516416cbee4cc33ab2104

  • SHA256

    5eb857c450defe0def1a3989d13a5d874bd4ea9db3d0fc9082ba3c92cfff6395

  • SHA512

    d144f11ad9d298f5d9835866a486443334f0cdc7a868b1ddcd1243a9ef30b365d4076d223a8aa4088262b669c1807c91be449a4d17d99a22ec4a2198edc6c2c2

  • SSDEEP

    24576:JOCUgWKt7TMUrYMjsdtgvPaoXAqaKI/RuJ0L:J5UgWw7TMerjsdtgvyoQqaKI/Ru+

Malware Config

Extracted

Family

latentbot

C2

hamzaitshigo.zapto.org

Targets

    • Target

      JaffaCakes118_632c6351bebc9946da445bc99409abb2

    • Size

      1.2MB

    • MD5

      632c6351bebc9946da445bc99409abb2

    • SHA1

      a6b1153b51624d75101516416cbee4cc33ab2104

    • SHA256

      5eb857c450defe0def1a3989d13a5d874bd4ea9db3d0fc9082ba3c92cfff6395

    • SHA512

      d144f11ad9d298f5d9835866a486443334f0cdc7a868b1ddcd1243a9ef30b365d4076d223a8aa4088262b669c1807c91be449a4d17d99a22ec4a2198edc6c2c2

    • SSDEEP

      24576:JOCUgWKt7TMUrYMjsdtgvPaoXAqaKI/RuJ0L:J5UgWw7TMerjsdtgvyoQqaKI/Ru+

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks