General

  • Target

    Form_Ver-16-46-33.js

  • Size

    572KB

  • Sample

    240627-sc787swfrc

  • MD5

    b1da07a445bfdf809306f5fe74e54d67

  • SHA1

    3cec038e474050c290bdf4e670a36f482032ed68

  • SHA256

    9003415cc22d4e8b3c444ffcf84bb3f1c3a294d40d1f66329733edfc8472a7d2

  • SHA512

    728b321b98f45fc6cd1395ee5a34c1ee06ca17800c35ec1ee7f19ac3219aa8fc805140e6d0ecc25a638f8c815db541380d0651df2ff448121477ed3445bd6637

  • SSDEEP

    6144:kMuyrXL4P/YsoZR3U52fYiGnh2xFpMp4/KJHaWTyFIXgBoEKnDmmzPvKYUNul8D7:kM/74PPitCt4XGlgJ5+Dk

Malware Config

Extracted

Family

latrodectus

C2

https://finjuiceer.com/live/

https://trymeakafr.com/live/

Targets

    • Target

      Form_Ver-16-46-33.js

    • Size

      572KB

    • MD5

      b1da07a445bfdf809306f5fe74e54d67

    • SHA1

      3cec038e474050c290bdf4e670a36f482032ed68

    • SHA256

      9003415cc22d4e8b3c444ffcf84bb3f1c3a294d40d1f66329733edfc8472a7d2

    • SHA512

      728b321b98f45fc6cd1395ee5a34c1ee06ca17800c35ec1ee7f19ac3219aa8fc805140e6d0ecc25a638f8c815db541380d0651df2ff448121477ed3445bd6637

    • SSDEEP

      6144:kMuyrXL4P/YsoZR3U52fYiGnh2xFpMp4/KJHaWTyFIXgBoEKnDmmzPvKYUNul8D7:kM/74PPitCt4XGlgJ5+Dk

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Latrodectus family

    • Latrodectus loader

      Latrodectus is a loader written in C++.

    • Detect larodectus Loader variant 2

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks