General

  • Target

    1c05a3de65c6b7e57b839de59e6948e5_JaffaCakes118

  • Size

    106KB

  • Sample

    240701-wxrnqswcrj

  • MD5

    1c05a3de65c6b7e57b839de59e6948e5

  • SHA1

    a0090ae49ad1864b17093f395af2c88e6ade1e8c

  • SHA256

    9d14f7ad91663142ec7093c28952de01ed800e4ff4693bfd85d7e1965db46e75

  • SHA512

    5ad6608fdf0c61c15ec684264c38d3b7fa1ea7a441d7c1050dc162c9221019a722b38517c122ebf6af2c52b15729666f0596eeeb93798776822fa5a373e2e8b6

  • SSDEEP

    1536:430vb+UyOwoLSkZzpabGfi/UJp/mI5J3D6Kz3PXM9LKaXEcXgbDgtMqZA:4kvUULtZNfvp/xFPXMINk/o

Malware Config

Extracted

Family

latentbot

C2

rotolonereg.zapto.org

Targets

    • Target

      1c05a3de65c6b7e57b839de59e6948e5_JaffaCakes118

    • Size

      106KB

    • MD5

      1c05a3de65c6b7e57b839de59e6948e5

    • SHA1

      a0090ae49ad1864b17093f395af2c88e6ade1e8c

    • SHA256

      9d14f7ad91663142ec7093c28952de01ed800e4ff4693bfd85d7e1965db46e75

    • SHA512

      5ad6608fdf0c61c15ec684264c38d3b7fa1ea7a441d7c1050dc162c9221019a722b38517c122ebf6af2c52b15729666f0596eeeb93798776822fa5a373e2e8b6

    • SSDEEP

      1536:430vb+UyOwoLSkZzpabGfi/UJp/mI5J3D6Kz3PXM9LKaXEcXgbDgtMqZA:4kvUULtZNfvp/xFPXMINk/o

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks