General

  • Target

    JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb

  • Size

    108KB

  • Sample

    250103-gy6rqaskgs

  • MD5

    6ab5a11f92f3a6ba7e6e54b53f6b87fb

  • SHA1

    7cc030edf8e47b07be265d6a8dca96c7097c2103

  • SHA256

    92b390040b832be2edd85939cefe1fbc92bde893648a455fa567c4917a88e358

  • SHA512

    0f8514ce4c884d76738e9896681ee3d631608100a8447965b6a69a13e89e54383c50e6f255d722399334f3cda8ce6cd11cef2ef3663d9f66b962219741b2147f

  • SSDEEP

    3072:k4oy8j7VnNdrPHaSekwi+mW+2XYcY4A0out:kI8jZ7rvaU3+mWroB4A0oS

Malware Config

Extracted

Family

latentbot

C2

sananelan43.zapto.org

Targets

    • Target

      JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb

    • Size

      108KB

    • MD5

      6ab5a11f92f3a6ba7e6e54b53f6b87fb

    • SHA1

      7cc030edf8e47b07be265d6a8dca96c7097c2103

    • SHA256

      92b390040b832be2edd85939cefe1fbc92bde893648a455fa567c4917a88e358

    • SHA512

      0f8514ce4c884d76738e9896681ee3d631608100a8447965b6a69a13e89e54383c50e6f255d722399334f3cda8ce6cd11cef2ef3663d9f66b962219741b2147f

    • SSDEEP

      3072:k4oy8j7VnNdrPHaSekwi+mW+2XYcY4A0out:kI8jZ7rvaU3+mWroB4A0oS

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks