General

  • Target

    2025-01-26_221a88df8b81317b16c83c23a377fafc_frostygoop_luca-stealer_snatch

  • Size

    5.3MB

  • Sample

    250126-bezw6swnaz

  • MD5

    221a88df8b81317b16c83c23a377fafc

  • SHA1

    d8f87ff4459de5f6722efd374f10d9389fb4b1cf

  • SHA256

    4e67bb7a28b872d14749968f75cd954ca1506ceb91be8e8d8b4b930aa387134a

  • SHA512

    0a1f3f70e0bbadac921343dc72d1ac66494acbaf0e9cad5cc43a71f1c3406da6c0f36a4401dfde8383b6d010988dbfd42a4418155fff33be756d80dbf679993e

  • SSDEEP

    98304:a3qGL7+Z2+G7R5jHQ3h6uX8vKv4d94cS73Zz/Ocknja:aqC7+Z2+sYUAEF2V35/OcS

Malware Config

Extracted

Family

latentbot

C2

36123623672437247.zapto.org

Targets

    • Target

      2025-01-26_221a88df8b81317b16c83c23a377fafc_frostygoop_luca-stealer_snatch

    • Size

      5.3MB

    • MD5

      221a88df8b81317b16c83c23a377fafc

    • SHA1

      d8f87ff4459de5f6722efd374f10d9389fb4b1cf

    • SHA256

      4e67bb7a28b872d14749968f75cd954ca1506ceb91be8e8d8b4b930aa387134a

    • SHA512

      0a1f3f70e0bbadac921343dc72d1ac66494acbaf0e9cad5cc43a71f1c3406da6c0f36a4401dfde8383b6d010988dbfd42a4418155fff33be756d80dbf679993e

    • SSDEEP

      98304:a3qGL7+Z2+G7R5jHQ3h6uX8vKv4d94cS73Zz/Ocknja:aqC7+Z2+sYUAEF2V35/OcS

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

    • Enumerates VirtualBox DLL files

    • Looks for VirtualBox drivers on disk

    • Looks for VirtualBox executables on disk

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks