General

  • Target

    b8ff431c58e1617e3abf77b5654d9b451923f0f23e1a1c101d3a52d026ee587a.exe

  • Size

    112KB

  • Sample

    250107-qr1rkasrdt

  • MD5

    f16965b322590adde7fd1b95b5d75cf7

  • SHA1

    9d6145e796d70df9e6128ec5d95517b303159900

  • SHA256

    b8ff431c58e1617e3abf77b5654d9b451923f0f23e1a1c101d3a52d026ee587a

  • SHA512

    37ed5cf934328420c8226edee6a34278efd7e5f1b47a2fdf9e53c44b4999cd0cc978c0b345e4fd3addbd68d3e0dfa306fa9089c8a03d63b258482d873045c2d5

  • SSDEEP

    1536:9qkzoRpTAdufT4f05ylAAt85jJdOsqkZS++YvQ8NUsOhmmWnoDPdv:xwpTyufT4f05ylAAtqjJdO1kwm/lnop

Malware Config

Extracted

Family

latentbot

C2

majrino2020.zapto.org

Targets

    • Target

      b8ff431c58e1617e3abf77b5654d9b451923f0f23e1a1c101d3a52d026ee587a.exe

    • Size

      112KB

    • MD5

      f16965b322590adde7fd1b95b5d75cf7

    • SHA1

      9d6145e796d70df9e6128ec5d95517b303159900

    • SHA256

      b8ff431c58e1617e3abf77b5654d9b451923f0f23e1a1c101d3a52d026ee587a

    • SHA512

      37ed5cf934328420c8226edee6a34278efd7e5f1b47a2fdf9e53c44b4999cd0cc978c0b345e4fd3addbd68d3e0dfa306fa9089c8a03d63b258482d873045c2d5

    • SSDEEP

      1536:9qkzoRpTAdufT4f05ylAAt85jJdOsqkZS++YvQ8NUsOhmmWnoDPdv:xwpTyufT4f05ylAAtqjJdO1kwm/lnop

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks