General

  • Target

    JaffaCakes118_683ed3d76c60bf1e62b0288d46077dd0

  • Size

    244KB

  • Sample

    250102-zxpe6awjav

  • MD5

    683ed3d76c60bf1e62b0288d46077dd0

  • SHA1

    b02b48445989e597bc9fb09154e40133962330b3

  • SHA256

    4a99cf8e9ceff0d0ab3ff3598ab6b399f10b4ba0e57bbe18071b6de709085382

  • SHA512

    74f244dd4825c5c31666c09290c8d616f6684f7d65b15a3139fdd487ba6ea431f316c8d730dad94cc63bae5f070ddb271824d1181ed4556cc34cfb86650effc5

  • SSDEEP

    3072:/7jj8GWe1UcqqCYLzFqNC1uLJKDME2AF02t9Gd/ID+xI0ri:Xj8jk7eJKD52A62id/k

Malware Config

Extracted

Family

latentbot

C2

algerianbox.zapto.org

Targets

    • Target

      JaffaCakes118_683ed3d76c60bf1e62b0288d46077dd0

    • Size

      244KB

    • MD5

      683ed3d76c60bf1e62b0288d46077dd0

    • SHA1

      b02b48445989e597bc9fb09154e40133962330b3

    • SHA256

      4a99cf8e9ceff0d0ab3ff3598ab6b399f10b4ba0e57bbe18071b6de709085382

    • SHA512

      74f244dd4825c5c31666c09290c8d616f6684f7d65b15a3139fdd487ba6ea431f316c8d730dad94cc63bae5f070ddb271824d1181ed4556cc34cfb86650effc5

    • SSDEEP

      3072:/7jj8GWe1UcqqCYLzFqNC1uLJKDME2AF02t9Gd/ID+xI0ri:Xj8jk7eJKD52A62id/k

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks