General
-
Target
1625ac230aa5ca950573f3ba0b1a7bd4c7fbd3e3686f9ecd4a40f1504bf33a11.zip
-
Size
394KB
-
Sample
240425-zqr8gaef6w
-
MD5
4f38d4bced025fdff0d4f9ff6c0054ad
-
SHA1
3aceddc9f5931d281d3ced1495eee7782124b371
-
SHA256
77193958e40ce9825a99c53a1c5b3c90e72b0cedeee3e23b0282e27d6ebdaddd
-
SHA512
49df74b0802b8a2db35a5bff6670438429ce533a980938da7301a7128dbaabf05fc279ffb3b1464c20549b3d46d978d6beb3047747828a6c5c75fb6c2212b926
-
SSDEEP
12288:rLN5hlEYuQZIqViWTHniC+TEDOgieLU+hRE:rh5hlERQbvHilTIOgieA+hu
Static task
static1
Behavioral task
behavioral1
Sample
1625ac230aa5ca950573f3ba0b1a7bd4c7fbd3e3686f9ecd4a40f1504bf33a11.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1625ac230aa5ca950573f3ba0b1a7bd4c7fbd3e3686f9ecd4a40f1504bf33a11.dll
Resource
win10v2004-20240412-en
Malware Config
Extracted
latrodectus
https://jarinamaers.shop/live/
https://wrankaget.site/live/
Targets
-
-
Target
1625ac230aa5ca950573f3ba0b1a7bd4c7fbd3e3686f9ecd4a40f1504bf33a11.exe
-
Size
885KB
-
MD5
74143402c40ac2e61e9f040a2d7e2d00
-
SHA1
4053dc85bb86c47c63f96681d6a62c21cd6342a3
-
SHA256
1625ac230aa5ca950573f3ba0b1a7bd4c7fbd3e3686f9ecd4a40f1504bf33a11
-
SHA512
4aa55b859f15be8b14c4a0ff6f3971f49b47c1c8c8427f179eb4ab0c76e321441adfd173469facb12aae1e81e25f1328fd621214b42e66f690ba4e9ee1e54cf9
-
SSDEEP
12288:gfPSAAUHV4fZUv/TrguVTax7hNRu18VA8JFoxMk/wYeDKDMyAmp:qPSAAUHV4fZUvfgmaxpu1F8J6xMYHMBS
Score10/10-
Detect larodectus Loader variant 2
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1