General
-
Target
Teletubbies-Asst-Thumbnail.png
-
Size
237KB
-
Sample
250416-aje7wsxzey
-
MD5
a2e5b9bf96a0bb0ad5afa765bdc88a3c
-
SHA1
e60cf3bc88e35b7b471a20f1ca619ce7bf268bd1
-
SHA256
b101408bab05ffc25b0ef735770840f40230fb99d9e10d420337d6113e6c1f5a
-
SHA512
79aaf6510936e77d0adb03fdee72a4197a645ed84b9e32daf708146e8a96bcffb95fde699ba2dfb646a88a55de9c77f4b1582c403e1982b5dbce2d1e1a6a90f5
-
SSDEEP
3072:sA+McPEy54C5TmVveG8cO/RqYG1FCk6paC6Q8LByqWmhhpaGhWGBom9u03m7bNJD:VSEGB5TGR0paBvys/9u03mHNJg9WrCm
Static task
static1
Behavioral task
behavioral1
Sample
Teletubbies-Asst-Thumbnail.png
Resource
win10v2004-20250314-en
Malware Config
Extracted
latentbot
epicpbglobal.zapto.org
Targets
-
-
Target
Teletubbies-Asst-Thumbnail.png
-
Size
237KB
-
MD5
a2e5b9bf96a0bb0ad5afa765bdc88a3c
-
SHA1
e60cf3bc88e35b7b471a20f1ca619ce7bf268bd1
-
SHA256
b101408bab05ffc25b0ef735770840f40230fb99d9e10d420337d6113e6c1f5a
-
SHA512
79aaf6510936e77d0adb03fdee72a4197a645ed84b9e32daf708146e8a96bcffb95fde699ba2dfb646a88a55de9c77f4b1582c403e1982b5dbce2d1e1a6a90f5
-
SSDEEP
3072:sA+McPEy54C5TmVveG8cO/RqYG1FCk6paC6Q8LByqWmhhpaGhWGBom9u03m7bNJD:VSEGB5TGR0paBvys/9u03mHNJg9WrCm
-
Latentbot family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-