Analysis
-
max time kernel
104s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2025, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
1bff045153c2e636bff3f688cf8fd8c524362a1b812e4821f379d64453ef8dbe.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1bff045153c2e636bff3f688cf8fd8c524362a1b812e4821f379d64453ef8dbe.dll
Resource
win10v2004-20250314-en
General
-
Target
1bff045153c2e636bff3f688cf8fd8c524362a1b812e4821f379d64453ef8dbe.dll
-
Size
1.8MB
-
MD5
e9c0510e88682f6c354ddd267fcd2ac0
-
SHA1
5a4295f88e2a73f57c04566f84480bf5ee8e6d8c
-
SHA256
1bff045153c2e636bff3f688cf8fd8c524362a1b812e4821f379d64453ef8dbe
-
SHA512
12c2bfbfc43e71851470abc4ea6e364d7745f4e0a4da2d88e3e79edc911b7f6a583d29c7c86b62eceecf656bfe49121fa2057402f8ae73eddaf7fcaac3a0d5bb
-
SSDEEP
49152:9srSb808eyLlSRqVNPseFyTJ1CLXuzYYjc8F4HcDsYfPFGMSugRP:KL1PYTI9Hco
Malware Config
Extracted
latrodectus
1.4
https://remustarofilac.com/test/
https://horetimodual.com/test/
-
group
Ferrary
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
Extracted
latrodectus
Signatures
-
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 5200 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 628 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5200 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5200 wrote to memory of 628 5200 rundll32.exe 88 PID 5200 wrote to memory of 628 5200 rundll32.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1bff045153c2e636bff3f688cf8fd8c524362a1b812e4821f379d64453ef8dbe.dll,#11⤵
- Deletes itself
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5200 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_be09e7d6.dll", #12⤵
- Loads dropped DLL
PID:628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5e9c0510e88682f6c354ddd267fcd2ac0
SHA15a4295f88e2a73f57c04566f84480bf5ee8e6d8c
SHA2561bff045153c2e636bff3f688cf8fd8c524362a1b812e4821f379d64453ef8dbe
SHA51212c2bfbfc43e71851470abc4ea6e364d7745f4e0a4da2d88e3e79edc911b7f6a583d29c7c86b62eceecf656bfe49121fa2057402f8ae73eddaf7fcaac3a0d5bb