General

  • Target

    JaffaCakes118_6a71fdc26cdca58920151050696a878c

  • Size

    31KB

  • Sample

    250103-fxt6vs1jhz

  • MD5

    6a71fdc26cdca58920151050696a878c

  • SHA1

    bcecb88fe5b423441f6e1b693192a337205bf689

  • SHA256

    b7695ce40866f23064ad3ee9f749ba8e5a19eca2800c164d73b0541aa603332b

  • SHA512

    f92f1fbc801a1c34840f7d234cfabe90efac53eff62e39cb320615a9e79d73a9e53702b171cefa5891ef4970169d75a19e5d8abea83f7702f709566372a0f8a1

  • SSDEEP

    768:Z+h7TzTBziifTeiZSVWihwEknh0L7OTLeNfQf2:kZ/nEkh8OTKNL

Malware Config

Extracted

Family

latentbot

C2

suhailahakar.zapto.org

Targets

    • Target

      JaffaCakes118_6a71fdc26cdca58920151050696a878c

    • Size

      31KB

    • MD5

      6a71fdc26cdca58920151050696a878c

    • SHA1

      bcecb88fe5b423441f6e1b693192a337205bf689

    • SHA256

      b7695ce40866f23064ad3ee9f749ba8e5a19eca2800c164d73b0541aa603332b

    • SHA512

      f92f1fbc801a1c34840f7d234cfabe90efac53eff62e39cb320615a9e79d73a9e53702b171cefa5891ef4970169d75a19e5d8abea83f7702f709566372a0f8a1

    • SSDEEP

      768:Z+h7TzTBziifTeiZSVWihwEknh0L7OTLeNfQf2:kZ/nEkh8OTKNL

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks