Malware Analysis Report

2025-05-28 17:23

Sample ID 250516-t4ayfsxrt3
Target mwtsp.dll
SHA256 69af1d10dd1dacae362ab8fd4e5bcc97ddb363cdeb06a4bf1bc3db4dfc68b1e1
Tags
latrodectus loader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

69af1d10dd1dacae362ab8fd4e5bcc97ddb363cdeb06a4bf1bc3db4dfc68b1e1

Threat Level: Known bad

The file mwtsp.dll was found to be: Known bad.

Malicious Activity Summary

latrodectus loader

Latrodectus family

Latrodectus loader

Blocklisted process makes network request

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2025-05-16 16:36

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-05-16 16:36

Reported

2025-05-16 16:46

Platform

win10ltsc2021-20250425-de

Max time kernel

437s

Max time network

548s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\mwtsp.dll,#1

Signatures

Latrodectus family

latrodectus

Latrodectus loader

loader latrodectus

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\mwtsp.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 c.pki.goog udp
GB 172.217.16.227:80 c.pki.goog tcp
US 8.8.8.8:53 daringdesigners.com udp
US 104.21.0.84:443 daringdesigners.com tcp
US 8.8.8.8:53 domtrst455.com udp
US 172.67.219.126:443 domtrst455.com tcp

Files

memory/916-0-0x00000276E2790000-0x00000276E4442000-memory.dmp

memory/916-3-0x00000276E2790000-0x00000276E4442000-memory.dmp