General
-
Target
9f5ae302ea1ed87c64e26390eb6f2a90593b3049aaa1292d495d4f93ac9b2d98
-
Size
1.3MB
-
Sample
240917-v8svhawbmj
-
MD5
e2d9ca6364ff2314bfbcc263d7fea8fd
-
SHA1
c4c38c618cdb1663569606e06f64975ee1b37793
-
SHA256
9f5ae302ea1ed87c64e26390eb6f2a90593b3049aaa1292d495d4f93ac9b2d98
-
SHA512
7e7e28b421e1889762ce6abd40b89ec2ad971b909065aa90d7a95da5a992a70df53aa75d41e24a48b7feb3dc87ab7b6d8223adf9e583d4e96e256ae66509057d
-
SSDEEP
24576:cQmj6HVNI/sE6lxMkY4Nd5NL4PcTwZP7n3lGIUpeu2GE:cQmj6HVe/D6lxMkY4Nd5NLicTQPz3lGo
Static task
static1
Behavioral task
behavioral1
Sample
9f5ae302ea1ed87c64e26390eb6f2a90593b3049aaa1292d495d4f93ac9b2d98.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f5ae302ea1ed87c64e26390eb6f2a90593b3049aaa1292d495d4f93ac9b2d98.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
latrodectus
https://isomicrotich.com/test/
https://rilomenifis.com/test/
Targets
-
-
Target
9f5ae302ea1ed87c64e26390eb6f2a90593b3049aaa1292d495d4f93ac9b2d98
-
Size
1.3MB
-
MD5
e2d9ca6364ff2314bfbcc263d7fea8fd
-
SHA1
c4c38c618cdb1663569606e06f64975ee1b37793
-
SHA256
9f5ae302ea1ed87c64e26390eb6f2a90593b3049aaa1292d495d4f93ac9b2d98
-
SHA512
7e7e28b421e1889762ce6abd40b89ec2ad971b909065aa90d7a95da5a992a70df53aa75d41e24a48b7feb3dc87ab7b6d8223adf9e583d4e96e256ae66509057d
-
SSDEEP
24576:cQmj6HVNI/sE6lxMkY4Nd5NL4PcTwZP7n3lGIUpeu2GE:cQmj6HVe/D6lxMkY4Nd5NLicTQPz3lGo
Score10/10-
Detects Latrodectus
Detects Latrodectus v1.4.
-
Latrodectus family
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-