MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f8e3eef1fda5969a7aabcc8fb5cc9f5fe245bbf6cc8e480459977b8e91eab9bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Latrodectus


Vendor detections: 15


Intelligence 15 IOCs YARA 9 File information Comments

SHA256 hash: f8e3eef1fda5969a7aabcc8fb5cc9f5fe245bbf6cc8e480459977b8e91eab9bd
SHA3-384 hash: 55c29a1dd90c61164c0c51f2fdcc77cd9ba0acdde986948f5cf9a939e6ea5a185b5d175f8eee629de389f782a4681d15
SHA1 hash: 47947da463dd6f4ecf61ae960235a35144e903a8
MD5 hash: 86b57c9deafed093d4b47b03823b4d14
humanhash: friend-comet-two-fillet
File name:apptext.dll
Download: download sample
Signature Latrodectus
File size:1'692'160 bytes
First seen:2024-11-13 06:15:49 UTC
Last seen:2024-11-13 09:58:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash cba5c505da2537f7a4d0d6fd4d118e5d (1 x Latrodectus)
ssdeep 24576:M7u7nB/DBD9accSqVO9y/QaDC4F3Zuk5UDJjbDE2W4VO8I/nYY:My/DBD9MVO9yosHF395UlbDBw82nB
Threatray 3 similar samples on MalwareBazaar
TLSH T173759F25E5A800A8D0F9D175CA4B4D66FB723C060B319ADB06A0DE6A2F37FD05E3DB15
TrID 72.7% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
13.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.5% (.EXE) OS/2 Executable (generic) (2029/13)
2.5% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter k3dg3___
Tags:BruteRatel BruteRatelC4 exe Latrodectus TA578

Intelligence


File Origin
# of uploads :
2
# of downloads :
3'808
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Document-v05-53-20.js
Verdict:
Malicious activity
Analysis date:
2024-11-13 06:15:40 UTC
Tags:
latrodectus

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
ransomware virus gates
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug evasive fingerprint hook keylogger masquerade microsoft_visual_cc packed packed packer_detected
Result
Threat name:
BruteRatel, Latrodectus
Detection:
malicious
Classification:
spre.bank.troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks if browser processes are running
Contains functionality to inject threads in other processes
Contains functionality to steal Internet Explorer form passwords
Creates a thread in another existing process (thread injection)
Found malware configuration
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Modifies the context of a thread in another process (thread injection)
Performs a network lookup / discovery via net view
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sets debug register (to hijack the execution of another thread)
Sigma detected: RunDLL32 Spawning Explorer
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ipconfig to lookup or modify the Windows network settings
Uses net.exe to modify the status of services
Uses whoami command line tool to query computer and username
Writes to foreign memory regions
Yara detected BruteRatel
Yara detected Latrodectus
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1554895 Sample: apptext.dll.exe Startdate: 13/11/2024 Architecture: WINDOWS Score: 100 66 xomamox.com 2->66 68 waffaffa.com 2->68 70 2 other IPs or domains 2->70 82 Suricata IDS alerts for network traffic 2->82 84 Found malware configuration 2->84 86 Antivirus detection for URL or domain 2->86 88 6 other signatures 2->88 11 loaddll64.exe 1 2->11         started        signatures3 process4 process5 13 rundll32.exe 12 11->13         started        17 cmd.exe 1 11->17         started        19 rundll32.exe 12 11->19         started        21 4 other processes 11->21 dnsIp6 74 waffaffa.com 45.143.166.83, 49816, 49982, 49983 ITTITT-ASRU Russian Federation 13->74 108 System process connects to network (likely due to code injection or exploit) 13->108 110 Injects code into the Windows Explorer (explorer.exe) 13->110 112 Writes to foreign memory regions 13->112 114 Injects a PE file into a foreign processes 13->114 23 explorer.exe 88 10 13->23 injected 116 Uses net.exe to modify the status of services 17->116 118 Uses ipconfig to lookup or modify the Windows network settings 17->118 120 Uses whoami command line tool to query computer and username 17->120 122 Performs a network lookup / discovery via net view 17->122 27 rundll32.exe 12 17->27         started        76 xomamox.com 80.66.76.106, 49704, 49705, 49706 VAD-SRL-AS1MD Russian Federation 19->76 124 Allocates memory in foreign processes 19->124 126 Modifies the context of a thread in another process (thread injection) 19->126 128 Creates a thread in another existing process (thread injection) 19->128 29 systeminfo.exe 2 1 21->29         started        31 conhost.exe 21->31         started        signatures7 process8 dnsIp9 72 rolefenik.com 104.21.92.105, 443, 49985, 49986 CLOUDFLARENETUS United States 23->72 90 System process connects to network (likely due to code injection or exploit) 23->90 92 Checks if browser processes are running 23->92 94 Contains functionality to steal Internet Explorer form passwords 23->94 96 Tries to harvest and steal browser information (history, passwords, etc) 23->96 33 cmd.exe 23->33         started        36 cmd.exe 23->36         started        38 cmd.exe 23->38         started        42 8 other processes 23->42 98 Contains functionality to inject threads in other processes 27->98 100 Injects code into the Windows Explorer (explorer.exe) 27->100 102 Sets debug register (to hijack the execution of another thread) 27->102 106 4 other signatures 27->106 104 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 29->104 40 WmiPrvSE.exe 29->40         started        signatures10 process11 signatures12 78 Performs a network lookup / discovery via net view 33->78 44 conhost.exe 33->44         started        46 net.exe 33->46         started        48 conhost.exe 36->48         started        50 net.exe 36->50         started        80 Uses whoami command line tool to query computer and username 38->80 58 2 other processes 38->58 52 net.exe 42->52         started        54 net.exe 42->54         started        56 conhost.exe 42->56         started        60 11 other processes 42->60 process13 process14 62 net1.exe 52->62         started        64 net1.exe 54->64         started       
Threat name:
Win64.Backdoor.Brutel
Status:
Malicious
First seen:
2024-11-13 06:16:06 UTC
File Type:
PE+ (Dll)
Extracted files:
57
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
bruteratel
Score:
  10/10
Tags:
family:bruteratel backdoor
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Blocklisted process makes network request
Brute Ratel C4
Bruteratel family
Detect BruteRatel badger
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
f8e3eef1fda5969a7aabcc8fb5cc9f5fe245bbf6cc8e480459977b8e91eab9bd
MD5 hash:
86b57c9deafed093d4b47b03823b4d14
SHA1 hash:
47947da463dd6f4ecf61ae960235a35144e903a8
Malware family:
Latrodectus
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:pe_detect_tls_callbacks
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Latrodectus

Executable exe f8e3eef1fda5969a7aabcc8fb5cc9f5fe245bbf6cc8e480459977b8e91eab9bd

(this sample)

  
Delivery method
Distributed via e-mail link

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (FORCE_INTEGRITY)high
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::EqualSid
ADVAPI32.dll::FreeSid
ADVAPI32.dll::GetSidSubAuthority
ADVAPI32.dll::GetSidSubAuthorityCount
ADVAPI32.dll::IsValidSid
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::GetSidIdentifierAuthority
ADVAPI32.dll::GetTokenInformation
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenProcessToken
ADVAPI32.dll::OpenThreadToken
ADVAPI32.dll::SetThreadToken
KERNEL32.dll::VirtualAllocExNuma
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineW
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleOutputCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW
KERNEL32.dll::FindFirstFileW
KERNEL32.dll::GetTempFileNameW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegQueryInfoKeyW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::FindWindowExW
USER32.dll::PeekMessageW

Comments