General

  • Target

    1fedb1fbce0fc41feabd5c54164547b5_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240702-tf86cazfqf

  • MD5

    1fedb1fbce0fc41feabd5c54164547b5

  • SHA1

    d75001fa1f4ff2a391aef04a5158b803d54798cd

  • SHA256

    6e5988c481f6aeb587b13c8ac878c14a14bae316461f02698025e2abc420ee82

  • SHA512

    c5c08e202bd212340e581448dbf6d351ce3fd835313bb05e4b6fb344ba4bb47b9a76d8bba2a4a70c4a3fdcc64fd9fa7fc3926d606482d57abdf0c7323f321521

  • SSDEEP

    24576:HnHngD0Mmf9IvYzAne5uxTjpB0GsdYksLtXf+PIDmJusil3P+uuxT8FtrkzqaiP2:nse5+vv1afusa32dg7dAxxHy4ehFK

Malware Config

Extracted

Family

latentbot

C2

yeniceriler.zapto.org

Targets

    • Target

      1fedb1fbce0fc41feabd5c54164547b5_JaffaCakes118

    • Size

      2.2MB

    • MD5

      1fedb1fbce0fc41feabd5c54164547b5

    • SHA1

      d75001fa1f4ff2a391aef04a5158b803d54798cd

    • SHA256

      6e5988c481f6aeb587b13c8ac878c14a14bae316461f02698025e2abc420ee82

    • SHA512

      c5c08e202bd212340e581448dbf6d351ce3fd835313bb05e4b6fb344ba4bb47b9a76d8bba2a4a70c4a3fdcc64fd9fa7fc3926d606482d57abdf0c7323f321521

    • SSDEEP

      24576:HnHngD0Mmf9IvYzAne5uxTjpB0GsdYksLtXf+PIDmJusil3P+uuxT8FtrkzqaiP2:nse5+vv1afusa32dg7dAxxHy4ehFK

    • LatentBot

      Modular trojan written in Delphi which has been in-the-wild since 2013.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks