General

  • Target

    Doc171836.js

  • Size

    412KB

  • Sample

    250219-wlx2daxpy5

  • MD5

    da7ed43b68df0e3a40b48e1fbb8b539b

  • SHA1

    c53936f0811fe54dd3f57e525c1dd31f04bf249d

  • SHA256

    eb164525c66c559aec32c119a9e2fa54444caefcd32b944a12c459e80fd568c4

  • SHA512

    bcadaf98784a8ef2b5fef711cf2f6402a932e9241220fc337294aeeaa08e3be9d98545b30a286dac4a0fdf51a462b7ca6930e44341f92fdad8a8035015c1ff41

  • SSDEEP

    3072:D5RU5Rv5RjiL2wiL2niL2WGyTGyR3d54+e0ekewer:VRkRRRj2T2m23GyTGydXJ5S

Malware Config

Extracted

Family

latrodectus

Version

1.4

C2

https://tynifinilam.com/test/

https://horetimodual.com/test/

aes.hex

Targets

    • Target

      Doc171836.js

    • Size

      412KB

    • MD5

      da7ed43b68df0e3a40b48e1fbb8b539b

    • SHA1

      c53936f0811fe54dd3f57e525c1dd31f04bf249d

    • SHA256

      eb164525c66c559aec32c119a9e2fa54444caefcd32b944a12c459e80fd568c4

    • SHA512

      bcadaf98784a8ef2b5fef711cf2f6402a932e9241220fc337294aeeaa08e3be9d98545b30a286dac4a0fdf51a462b7ca6930e44341f92fdad8a8035015c1ff41

    • SSDEEP

      3072:D5RU5Rv5RjiL2wiL2niL2WGyTGyR3d54+e0ekewer:VRkRRRj2T2m23GyTGydXJ5S

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Detects Latrodectus

      Detects Latrodectus v1.4.

    • Latrodectus family

    • Latrodectus loader

      Latrodectus is a loader written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks