General
-
Target
MSI.msi
-
Size
1.5MB
-
Sample
240510-1yb2wsfa93
-
MD5
b4a482a7e96cfdef632a7af286120156
-
SHA1
73e3639a9388af84b9c0f172b3aeaf3823014596
-
SHA256
ead5ebf464c313176174ff0fdc3360a3477f6361d0947221d31287eeb04691b3
-
SHA512
15661f1dc751a48f5d213ec99c046e0b9fa1a2201d238d26bee0f15341e9d84611c30f152c463368c6d59f3e7cccb5ae991b1f3127ad65eb3a2ea7823d3b598b
-
SSDEEP
49152:oIR3YuW8zBQSc0ZnSKYZKumZr7ANCuyspI:FY90ZniK/A8uR
Static task
static1
Behavioral task
behavioral1
Sample
MSI.msi
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
MSI.msi
Resource
win10v2004-20240426-en
Malware Config
Extracted
latrodectus
https://workspacin.cloud/live/
https://illoskanawer.com/live/
Targets
-
-
Target
MSI.msi
-
Size
1.5MB
-
MD5
b4a482a7e96cfdef632a7af286120156
-
SHA1
73e3639a9388af84b9c0f172b3aeaf3823014596
-
SHA256
ead5ebf464c313176174ff0fdc3360a3477f6361d0947221d31287eeb04691b3
-
SHA512
15661f1dc751a48f5d213ec99c046e0b9fa1a2201d238d26bee0f15341e9d84611c30f152c463368c6d59f3e7cccb5ae991b1f3127ad65eb3a2ea7823d3b598b
-
SSDEEP
49152:oIR3YuW8zBQSc0ZnSKYZKumZr7ANCuyspI:FY90ZniK/A8uR
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger
-
Latrodectus family
-
Detect larodectus Loader variant 2
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1