General
-
Target
Doc171836.js
-
Size
412KB
-
Sample
250219-wlx2daxpy5
-
MD5
da7ed43b68df0e3a40b48e1fbb8b539b
-
SHA1
c53936f0811fe54dd3f57e525c1dd31f04bf249d
-
SHA256
eb164525c66c559aec32c119a9e2fa54444caefcd32b944a12c459e80fd568c4
-
SHA512
bcadaf98784a8ef2b5fef711cf2f6402a932e9241220fc337294aeeaa08e3be9d98545b30a286dac4a0fdf51a462b7ca6930e44341f92fdad8a8035015c1ff41
-
SSDEEP
3072:D5RU5Rv5RjiL2wiL2niL2WGyTGyR3d54+e0ekewer:VRkRRRj2T2m23GyTGydXJ5S
Static task
static1
Behavioral task
behavioral1
Sample
Doc171836.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Doc171836.js
Resource
win10v2004-20250217-en
Malware Config
Extracted
latrodectus
1.4
https://tynifinilam.com/test/
https://horetimodual.com/test/
Targets
-
-
Target
Doc171836.js
-
Size
412KB
-
MD5
da7ed43b68df0e3a40b48e1fbb8b539b
-
SHA1
c53936f0811fe54dd3f57e525c1dd31f04bf249d
-
SHA256
eb164525c66c559aec32c119a9e2fa54444caefcd32b944a12c459e80fd568c4
-
SHA512
bcadaf98784a8ef2b5fef711cf2f6402a932e9241220fc337294aeeaa08e3be9d98545b30a286dac4a0fdf51a462b7ca6930e44341f92fdad8a8035015c1ff41
-
SSDEEP
3072:D5RU5Rv5RjiL2wiL2niL2WGyTGyR3d54+e0ekewer:VRkRRRj2T2m23GyTGydXJ5S
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger
-
Detects Latrodectus
Detects Latrodectus v1.4.
-
Latrodectus family
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-