General

  • Target

    fbda4412c67d089572ec8929a0d246c9cb0b6708b4f3c3bea05e68b262fc0a31

  • Size

    48KB

  • Sample

    250422-x19jdsynx9

  • MD5

    a39ef13262322ba548155a31d61b9b26

  • SHA1

    1f4c7e3b7628a6618563fcd59694ed7d04d4fb89

  • SHA256

    fbda4412c67d089572ec8929a0d246c9cb0b6708b4f3c3bea05e68b262fc0a31

  • SHA512

    5d4eed5b8db921f6311713fa045d7fa7205b341ba0ad6134bf05ad011b0bd53bbbe34e23966cc903a3ef7318763a6096f48ffea3c02179c8fffa1f5308936b65

  • SSDEEP

    768:a1eBHSiB4aOhgk2DDYP8nd7BKBu2gNTkKkiiym688Jvkn658fm5ExmSxqqx295xT:a1eBytHAkkUeTkZiia8gvk6uftBxrI7l

Malware Config

Extracted

Family

latentbot

C2

cryptoghost.zapto.org

Targets

    • Target

      fbda4412c67d089572ec8929a0d246c9cb0b6708b4f3c3bea05e68b262fc0a31

    • Size

      48KB

    • MD5

      a39ef13262322ba548155a31d61b9b26

    • SHA1

      1f4c7e3b7628a6618563fcd59694ed7d04d4fb89

    • SHA256

      fbda4412c67d089572ec8929a0d246c9cb0b6708b4f3c3bea05e68b262fc0a31

    • SHA512

      5d4eed5b8db921f6311713fa045d7fa7205b341ba0ad6134bf05ad011b0bd53bbbe34e23966cc903a3ef7318763a6096f48ffea3c02179c8fffa1f5308936b65

    • SSDEEP

      768:a1eBHSiB4aOhgk2DDYP8nd7BKBu2gNTkKkiiym688Jvkn658fm5ExmSxqqx295xT:a1eBytHAkkUeTkZiia8gvk6uftBxrI7l

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Latentbot family

MITRE ATT&CK Enterprise v16

Tasks