MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f2170f7dc2f97434ef4514ed4272dc8792177038a085f248ba33f9259720afda. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Latrodectus


Vendor detections: 11


Intelligence 11 IOCs YARA 6 File information Comments

SHA256 hash: f2170f7dc2f97434ef4514ed4272dc8792177038a085f248ba33f9259720afda
SHA3-384 hash: 56b7d553553deace44b2b0eefddf159629c8c38289141645e55203fa130fc02099b748e84c1e38a0198eb8c1a75cd44a
SHA1 hash: 13b14fb516fa726cc5fa9af17a2f93ff49449830
MD5 hash: 50bd4ff60c931861e46c801a60f9e916
humanhash: vermont-east-gee-nebraska
File name:wait.dll
Download: download sample
Signature Latrodectus
File size:2'151'936 bytes
First seen:2024-12-02 17:41:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 151a05f8c4e108b7847025bc50b7e6b7 (1 x Latrodectus)
ssdeep 24576:JgWryG1z2cMbUhtEx+GRy1tWfxFDIHS4KGwt6nbmBdve1/JznfTWj+bXD:So0lolWfxeHlBwt6n+d21V7Wj+DD
Threatray 3 similar samples on MalwareBazaar
TLSH T1E8A58D297A9885B4D1FAC238C5678A4BF7B278168B31E3CF1256058E1F37BE1453F621
TrID 72.7% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
13.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.5% (.EXE) OS/2 Executable (generic) (2029/13)
2.5% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter k3dg3___
Tags:exe Latrodectus TA578

Intelligence


File Origin
# of uploads :
1
# of downloads :
430
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
zdi.txt
Verdict:
No threats detected
Analysis date:
2024-12-02 17:40:20 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
ransomware shellcode dropper
Result
Verdict:
Clean
Maliciousness:
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug crypto fingerprint hacktool lolbin masquerade microsoft_visual_cc packed packed packer_detected remote rundll32
Result
Threat name:
BruteRatel, Latrodectus
Detection:
malicious
Classification:
spre.bank.troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks if browser processes are running
Contains functionality to inject threads in other processes
Contains functionality to steal Internet Explorer form passwords
Creates a thread in another existing process (thread injection)
Found malware configuration
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Modifies the context of a thread in another process (thread injection)
Performs a network lookup / discovery via net view
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sets debug register (to hijack the execution of another thread)
Sigma detected: RunDLL32 Spawning Explorer
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ipconfig to lookup or modify the Windows network settings
Uses net.exe to modify the status of services
Uses whoami command line tool to query computer and username
Writes to foreign memory regions
Yara detected BruteRatel
Yara detected Latrodectus
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1566852 Sample: wait.dll.exe Startdate: 02/12/2024 Architecture: WINDOWS Score: 100 63 vutarf.com 2->63 65 reateberam.com 2->65 67 3 other IPs or domains 2->67 77 Suricata IDS alerts for network traffic 2->77 79 Found malware configuration 2->79 81 Antivirus detection for URL or domain 2->81 83 6 other signatures 2->83 11 loaddll64.exe 1 2->11         started        signatures3 process4 process5 13 rundll32.exe 12 11->13         started        17 cmd.exe 1 11->17         started        19 rundll32.exe 12 11->19         started        21 conhost.exe 11->21         started        dnsIp6 75 vutarf.com 94.232.43.224, 49713, 49740, 49761 WELLWEBNL Russian Federation 13->75 103 Contains functionality to inject threads in other processes 13->103 105 Injects code into the Windows Explorer (explorer.exe) 13->105 107 Sets debug register (to hijack the execution of another thread) 13->107 123 3 other signatures 13->123 23 explorer.exe 98 10 13->23 injected 109 Uses net.exe to modify the status of services 17->109 111 Uses ipconfig to lookup or modify the Windows network settings 17->111 113 Uses whoami command line tool to query computer and username 17->113 115 Performs a network lookup / discovery via net view 17->115 27 rundll32.exe 12 17->27         started        117 System process connects to network (likely due to code injection or exploit) 19->117 119 Writes to foreign memory regions 19->119 121 Allocates memory in foreign processes 19->121 signatures7 process8 dnsIp9 69 dogirafer.com 104.21.68.89, 443, 49972, 49980 CLOUDFLARENETUS United States 23->69 71 reateberam.com 172.67.217.190, 443, 49907, 49916 CLOUDFLARENETUS United States 23->71 87 System process connects to network (likely due to code injection or exploit) 23->87 89 Checks if browser processes are running 23->89 91 Contains functionality to steal Internet Explorer form passwords 23->91 93 Tries to harvest and steal browser information (history, passwords, etc) 23->93 29 cmd.exe 1 23->29         started        31 cmd.exe 23->31         started        34 cmd.exe 23->34         started        36 8 other processes 23->36 73 huanvn.com 103.57.249.207, 49704, 49705, 49706 SITINETWORS-IN-APSITINETWORKSLIMITEDIN India 27->73 95 Injects code into the Windows Explorer (explorer.exe) 27->95 97 Writes to foreign memory regions 27->97 99 Allocates memory in foreign processes 27->99 101 3 other signatures 27->101 signatures10 process11 signatures12 38 systeminfo.exe 2 1 29->38         started        41 conhost.exe 29->41         started        125 Performs a network lookup / discovery via net view 31->125 43 conhost.exe 31->43         started        45 net.exe 31->45         started        53 2 other processes 34->53 127 Uses whoami command line tool to query computer and username 36->127 47 net.exe 36->47         started        49 net.exe 36->49         started        51 conhost.exe 36->51         started        55 13 other processes 36->55 process13 signatures14 85 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 38->85 57 WmiPrvSE.exe 38->57         started        59 net1.exe 47->59         started        61 net1.exe 49->61         started        process15
Threat name:
Win64.Backdoor.Brutel
Status:
Malicious
First seen:
2024-12-02 17:38:05 UTC
File Type:
PE+ (Dll)
Extracted files:
4
AV detection:
17 of 38 (44.74%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Blocklisted process makes network request
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
f2170f7dc2f97434ef4514ed4272dc8792177038a085f248ba33f9259720afda
MD5 hash:
50bd4ff60c931861e46c801a60f9e916
SHA1 hash:
13b14fb516fa726cc5fa9af17a2f93ff49449830
Malware family:
Latrodectus
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:pe_detect_tls_callbacks
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail link

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (FORCE_INTEGRITY)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::ConvertStringSecurityDescriptorToSecurityDescriptorW
ADVAPI32.dll::InitializeSecurityDescriptor
COM_BASE_APICan Download & Execute componentsole32.dll::CoAddRefServerProcess
ole32.dll::CoCreateInstanceEx
ole32.dll::CoCreateInstance
ole32.dll::CoInitializeSecurity
RPC_APICan Execute Remote ProceduresRPCRT4.dll::RpcImpersonateClient
RPCRT4.dll::RpcRevertToSelfEx
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::GetTokenInformation
ADVAPI32.dll::SetSecurityDescriptorDacl
SS_APIUses SS APIbcrypt.dll::BCryptVerifySignature
WIN32_PROCESS_APICan Create Process and ThreadsADVAPI32.dll::CreateProcessAsUserW
ADVAPI32.dll::OpenThreadToken
KERNEL32.dll::VirtualAllocExNuma
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileExW
KERNEL32.dll::GetSystemDirectoryW
KERNEL32.dll::GetFileAttributesW
WIN_BCRYPT_APICan Encrypt Filesbcrypt.dll::BCryptCreateHash
bcrypt.dll::BCryptDecrypt
bcrypt.dll::BCryptDestroyHash
bcrypt.dll::BCryptDestroyKey
bcrypt.dll::BCryptEncrypt
bcrypt.dll::BCryptExportKey
WIN_CRYPT_APIUses Windows Crypt APICRYPT32.dll::CryptDecodeObjectEx
bcrypt.dll::BCryptGenRandom
bcrypt.dll::BCryptHashData
bcrypt.dll::BCryptImportKeyPair
CRYPT32.dll::CryptImportPublicKeyInfoEx2
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegNotifyChangeKeyValue
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryInfoKeyW
ADVAPI32.dll::RegQueryValueExW
WIN_SOCK_APIUses Network to send and receive dataWS2_32.dll::freeaddrinfo
WS2_32.dll::getaddrinfo
WS2_32.dll::WSAPoll

Comments