General

  • Target

    JaffaCakes118_0f6d8b79e668c83c4d83acdb25d93456

  • Size

    285KB

  • Sample

    250122-t1sn4avpax

  • MD5

    0f6d8b79e668c83c4d83acdb25d93456

  • SHA1

    f773f9fde2919dc4f63aad0a538ccb23dfffe234

  • SHA256

    10abd2f7ecc4ddf2c6e2049f8d7eb9cdba77532c23c94a3aa9c2206b7f45becc

  • SHA512

    e621ea7305c8a74e39fb9c8cd3ed57c3569e10ef08d9aada6dd0da79adf5997c3ddd1feb887474fdedc80be414564b3993db040075f17c23730058ce42f57565

  • SSDEEP

    6144:rquhyzUJzsKs0/1aABimok07EQUVguT8Jb3ZgTexK:mU6Ks01c+AnUnab3ZgTe4

Malware Config

Extracted

Family

latentbot

C2

dminformatica.zapto.org

Targets

    • Target

      JaffaCakes118_0f6d8b79e668c83c4d83acdb25d93456

    • Size

      285KB

    • MD5

      0f6d8b79e668c83c4d83acdb25d93456

    • SHA1

      f773f9fde2919dc4f63aad0a538ccb23dfffe234

    • SHA256

      10abd2f7ecc4ddf2c6e2049f8d7eb9cdba77532c23c94a3aa9c2206b7f45becc

    • SHA512

      e621ea7305c8a74e39fb9c8cd3ed57c3569e10ef08d9aada6dd0da79adf5997c3ddd1feb887474fdedc80be414564b3993db040075f17c23730058ce42f57565

    • SSDEEP

      6144:rquhyzUJzsKs0/1aABimok07EQUVguT8Jb3ZgTexK:mU6Ks01c+AnUnab3ZgTe4

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks