General

  • Target

    1625ac230aa5ca950573f3ba0b1a7bd4c7fbd3e3686f9ecd4a40f1504bf33a11.zip

  • Size

    394KB

  • Sample

    240425-zqr8gaef6w

  • MD5

    4f38d4bced025fdff0d4f9ff6c0054ad

  • SHA1

    3aceddc9f5931d281d3ced1495eee7782124b371

  • SHA256

    77193958e40ce9825a99c53a1c5b3c90e72b0cedeee3e23b0282e27d6ebdaddd

  • SHA512

    49df74b0802b8a2db35a5bff6670438429ce533a980938da7301a7128dbaabf05fc279ffb3b1464c20549b3d46d978d6beb3047747828a6c5c75fb6c2212b926

  • SSDEEP

    12288:rLN5hlEYuQZIqViWTHniC+TEDOgieLU+hRE:rh5hlERQbvHilTIOgieA+hu

Malware Config

Extracted

Family

latrodectus

C2

https://jarinamaers.shop/live/

https://wrankaget.site/live/

Targets

    • Target

      1625ac230aa5ca950573f3ba0b1a7bd4c7fbd3e3686f9ecd4a40f1504bf33a11.exe

    • Size

      885KB

    • MD5

      74143402c40ac2e61e9f040a2d7e2d00

    • SHA1

      4053dc85bb86c47c63f96681d6a62c21cd6342a3

    • SHA256

      1625ac230aa5ca950573f3ba0b1a7bd4c7fbd3e3686f9ecd4a40f1504bf33a11

    • SHA512

      4aa55b859f15be8b14c4a0ff6f3971f49b47c1c8c8427f179eb4ab0c76e321441adfd173469facb12aae1e81e25f1328fd621214b42e66f690ba4e9ee1e54cf9

    • SSDEEP

      12288:gfPSAAUHV4fZUv/TrguVTax7hNRu18VA8JFoxMk/wYeDKDMyAmp:qPSAAUHV4fZUvfgmaxpu1F8J6xMYHMBS

    • Latrodectus loader

      Latrodectus is a loader written in C++.

    • Detect larodectus Loader variant 2

    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand microsoft.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks