MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3af32eeede84d9ab70ce15ef51fa2bd7da42224537551410f565d1ec3b22b005. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Latrodectus


Vendor detections: 12


Intelligence 12 IOCs YARA 12 File information Comments

SHA256 hash: 3af32eeede84d9ab70ce15ef51fa2bd7da42224537551410f565d1ec3b22b005
SHA3-384 hash: 2a50e271477db1d76a905ea11cedc3b150a86b724c97260aca2eed4aa096c510269af10e443e0018a1b4b2b9a7f109d2
SHA1 hash: ff31550c1982f163330373c78c5b24cf67dce641
MD5 hash: a016d788091ab3f05578b633404c5fbf
humanhash: carolina-beer-network-alabama
File name:package_latest.msi
Download: download sample
Signature Latrodectus
File size:2'313'728 bytes
First seen:2025-07-31 21:50:30 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 49152:r0MHYkZKumZr7ACI1KnJekRIm2Zwr0fYF9hPXjVBl3:XYuK/ACIe1R4Z2/PXZ
Threatray 11 similar samples on MalwareBazaar
TLSH T12FB5F0217396C637C96E0270392AD79B156CFCA30B7180D7A3C82D2E9DB45C16739FA6
TrID 80.0% (.MSI) Microsoft Windows Installer (454500/1/170)
10.7% (.MST) Windows SDK Setup Transform script (61000/1/5)
7.8% (.MSP) Windows Installer Patch (44509/10/5)
1.4% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter SquiblydooBlog
Tags:Latrodectus msi signed

Code Signing Certificate

Organisation:APPEX FINVEST PVT LTD
Issuer:GlobalSign GCC R45 EV CodeSigning CA 2020
Algorithm:sha256WithRSAEncryption
Valid from:2025-07-24T14:41:27Z
Valid to:2026-07-25T14:41:27Z
Serial number: 5ae7f3327e5b41a9948647e8
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Cert Graveyard Blocklist:This certificate is on the Cert Graveyard blocklist
Thumbprint Algorithm:SHA256
Thumbprint: 000f83a775f04a6d0576a221345922959c865fa4aed9356a9d931746272ec76d
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
267
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Malicious
Score:
96.5%
Tags:
shellcode dropper virus
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm base64 cmd expired-cert fingerprint lolbin signed wix
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Threat:
Trojan-Dropper.OLE2.Legion
Threat name:
Win64.Spyware.Latrodectus
Status:
Malicious
First seen:
2025-07-31 21:51:43 UTC
File Type:
Binary (Archive)
Extracted files:
124
AV detection:
15 of 24 (62.50%)
Threat level:
  2/5
Result
Malware family:
latrodectus
Score:
  10/10
Tags:
family:latrodectus discovery loader persistence privilege_escalation ransomware
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Event Triggered Execution: Installer Packages
System Location Discovery: System Language Discovery
Drops file in Windows directory
Executes dropped EXE
Loads dropped DLL
Adds Run key to start application
Blocklisted process makes network request
Enumerates connected drives
Detects Latrodectus
Latrodectus family
Latrodectus loader
Malware Config
C2 Extraction:
https://dralbandrhifit.com/work/
https://servilinisfadustrit.com/work/
Malware family:
Latrodectus.v22
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_LATAM_MSI_Banker
Rule name:Detect_MSI_LATAM_Banker_From_LatAm
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:Latrodectus_AES
Author:enzok
Description:Latrodectus Payload
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:Windows_Trojan_Latrodectus_841ff697
Author:Elastic Security
Rule name:win_latrodectus_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.latrodectus.
Rule name:win_unidentified_111_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.unidentified_111.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (FORCE_INTEGRITY)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::BuildTrusteeWithSidW
ADVAPI32.dll::ConvertStringSidToSidW
ADVAPI32.dll::GetSecurityInfo
ADVAPI32.dll::SetEntriesInAclW
ADVAPI32.dll::SetSecurityInfo
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
ole32.dll::CoInitializeSecurity
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetConsoleCtrlHandler
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleOutputCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW
VERSION.dll::GetFileVersionInfoSizeW
VERSION.dll::GetFileVersionInfoW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyExW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
ADVAPI32.dll::RegDeleteTreeW

Comments