General
-
Target
5f4f3b0d4378171bb18896b50ec84331e5a9b68346d3489c326116cfd9855390.exe
-
Size
13.0MB
-
Sample
250207-fhtxjs1leq
-
MD5
f47c4d1fe89f9177e6bcaad7a901e58b
-
SHA1
fca0b3bc67c4566d10b4985c0423679da0a30670
-
SHA256
5f4f3b0d4378171bb18896b50ec84331e5a9b68346d3489c326116cfd9855390
-
SHA512
c43d9ae54a755b9d38acf7adfb81cafca61c335f3ae47fe869950c0842010b2a782c31334e56cee00b1f6d23809391b29431a96757eff39a0433581523a861a8
-
SSDEEP
393216:GNPrMFSFWUdZakpQyvHjPXEu4nHfjw3BEmt3rK:4iSF/2gDEugwBEIO
Static task
static1
Behavioral task
behavioral1
Sample
5f4f3b0d4378171bb18896b50ec84331e5a9b68346d3489c326116cfd9855390.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f4f3b0d4378171bb18896b50ec84331e5a9b68346d3489c326116cfd9855390.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
latrodectus
1.4
https://apworsindos.com/test/
https://reminasolirol.com/test/
-
group
Mimikast
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
Targets
-
-
Target
5f4f3b0d4378171bb18896b50ec84331e5a9b68346d3489c326116cfd9855390.exe
-
Size
13.0MB
-
MD5
f47c4d1fe89f9177e6bcaad7a901e58b
-
SHA1
fca0b3bc67c4566d10b4985c0423679da0a30670
-
SHA256
5f4f3b0d4378171bb18896b50ec84331e5a9b68346d3489c326116cfd9855390
-
SHA512
c43d9ae54a755b9d38acf7adfb81cafca61c335f3ae47fe869950c0842010b2a782c31334e56cee00b1f6d23809391b29431a96757eff39a0433581523a861a8
-
SSDEEP
393216:GNPrMFSFWUdZakpQyvHjPXEu4nHfjw3BEmt3rK:4iSF/2gDEugwBEIO
Score10/10-
Latrodectus family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-