Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

Latrodectus

Latrodectus is a Windows malware downloader that has been used since at least 2023 to download and execute additional payloads and modules. Latrodectus has most often been distributed through email campaigns, primarily by TA577 and TA578, and has infrastructure overlaps with historic IcedID operations.(Citation: Latrodectus APR 2024)(Citation: Bleeping Computer Latrodectus April 2024)(Citation: Bitsight Latrodectus June 2024)
ID: S1160
Associated Software: IceNova Unidentified 111
Type: MALWARE
Platforms: Windows
Created: 16 Sep 2024
Last Modified: 30 Sep 2024

Associated Software Descriptions

Name Description
IceNova (Citation: Bleeping Computer Latrodectus April 2024)
Unidentified 111 (Citation: Bleeping Computer Latrodectus April 2024)

Techniques Used

Domain ID Name Use
Enterprise T1087 .002 Account Discovery: Domain Account

Latrodectus can run `C:\Windows\System32\cmd.exe /c net group "Domain Admins" /domain` to identify domain administrator accounts.(Citation: Elastic Latrodectus May 2024)

Enterprise T1071 .001 Application Layer Protocol: Web Protocols

Latrodectus can send registration information to C2 via HTTP `POST`.(Citation: Latrodectus APR 2024)(Citation: Elastic Latrodectus May 2024)(Citation: Bitsight Latrodectus June 2024)

Enterprise T1547 .001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

Latrodectus can set an AutoRun key to establish persistence.(Citation: Latrodectus APR 2024)

Enterprise T1059 .003 Command and Scripting Interpreter: Windows Command Shell

The Latrodectus command handler can use `cmdexe` to run multiple discovery commands.(Citation: Elastic Latrodectus May 2024)(Citation: Bitsight Latrodectus June 2024)

.007 Command and Scripting Interpreter: JavaScript

Latrodectus has used JavaScript files as part its infection chain during malicious spam email campaigns.(Citation: Elastic Latrodectus May 2024)(Citation: Bitsight Latrodectus June 2024)(Citation: Palo Alto Latrodectus Activity June 2024)

Enterprise T1132 .001 Data Encoding: Standard Encoding

Latrodectus has Base64-encoded the message body of a HTTP request sent to C2.(Citation: Latrodectus APR 2024)(Citation: Elastic Latrodectus May 2024)

Enterprise T1573 .001 Encrypted Channel: Symmetric Cryptography

Latrodectus can send RC4 encrypted data over C2 channels.(Citation: Latrodectus APR 2024)(Citation: Elastic Latrodectus May 2024)(Citation: Bitsight Latrodectus June 2024)

Enterprise T1564 .004 Hide Artifacts: NTFS File Attributes

Latrodectus can delete itself while its process is still running through the use of an alternate data stream.(Citation: Elastic Latrodectus May 2024)

Enterprise T1070 .004 Indicator Removal: File Deletion

Latrodectus has the ability to delete itself.(Citation: Elastic Latrodectus May 2024)(Citation: Bitsight Latrodectus June 2024)

Enterprise T1559 .001 Inter-Process Communication: Component Object Model

Latrodectus can use the Windows Component Object Model (COM) to set scheduled tasks.(Citation: Elastic Latrodectus May 2024)(Citation: Bitsight Latrodectus June 2024)

Enterprise T1036 .005 Masquerading: Match Legitimate Name or Location

Latrodectus has been packed to appear as a component to Bitdefender’s kernel-mode driver, TRUFOS.SYS.(Citation: Elastic Latrodectus May 2024)

Enterprise T1027 .001 Obfuscated Files or Information: Binary Padding

Latrodectus has been obfuscated with a 129 byte sequence of junk data prepended to the file.(Citation: Elastic Latrodectus May 2024)

.002 Obfuscated Files or Information: Software Packing

The Latrodectus payload has been packed for obfuscation.(Citation: Elastic Latrodectus May 2024)

.007 Obfuscated Files or Information: Dynamic API Resolution

Latrodectus can resolve Windows APIs dynamically by hash.(Citation: Latrodectus APR 2024)

.013 Obfuscated Files or Information: Encrypted/Encoded File

Latrodectus has used a pseudo random number generator (PRNG) algorithm and a rolling XOR key to obfuscate strings.(Citation: Latrodectus APR 2024)(Citation: Elastic Latrodectus May 2024)(Citation: Bitsight Latrodectus June 2024)

Enterprise T1069 .002 Permission Groups Discovery: Domain Groups

Latrodectus can identify domain groups through `cmd.exe /c net group "Domain Admins" /domain`.(Citation: Bitsight Latrodectus June 2024)(Citation: Elastic Latrodectus May 2024)

Enterprise T1566 .001 Phishing: Spearphishing Attachment

Latrodectus has been distributed through reply-chain phishing emails with malicious attachments.(Citation: Bleeping Computer Latrodectus April 2024)

.002 Phishing: Spearphishing Link

Latrodectus has been distributed to victims through emails containing malicious links.(Citation: Latrodectus APR 2024)(Citation: Bleeping Computer Latrodectus April 2024)

Enterprise T1021 .005 Remote Services: VNC

Latrodectus has routed C2 traffic using Keyhole VNC.(Citation: Palo Alto Latrodectus Activity June 2024)

Enterprise T1053 .005 Scheduled Task/Job: Scheduled Task

Latrodectus can create scheduled tasks for persistence.(Citation: Latrodectus APR 2024)(Citation: Elastic Latrodectus May 2024)(Citation: Bitsight Latrodectus June 2024)

Enterprise T1518 .001 Software Discovery: Security Software Discovery

Latrodectus has the ability to identify installed antivirus products.(Citation: Elastic Latrodectus May 2024)(Citation: Bitsight Latrodectus June 2024)

Enterprise T1218 .007 System Binary Proxy Execution: Msiexec

Latrodectus has called `msiexec` to install remotely-hosted MSI files.(Citation: Latrodectus APR 2024)(Citation: Bleeping Computer Latrodectus April 2024)

.011 System Binary Proxy Execution: Rundll32

Latrodectus can use rundll32.exe to execute downloaded DLLs.(Citation: Elastic Latrodectus May 2024)(Citation: Bleeping Computer Latrodectus April 2024)

Enterprise T1204 .001 User Execution: Malicious Link

Latrodectus has been executed through malicious links distributed in email campaigns.(Citation: Latrodectus APR 2024)(Citation: Bleeping Computer Latrodectus April 2024)

.002 User Execution: Malicious File

Latrodectus has lured users into opening malicious email attachments for execution.(Citation: Bleeping Computer Latrodectus April 2024)

Enterprise T1497 .001 Virtualization/Sandbox Evasion: System Checks

Latrodectus can determine if it is running in a virtualized environment by checking the OS version, checking the number of running processes, ensuring a 64-bit application is running on a 64-bit host, and checking if the host has a valid MAC address.(Citation: Latrodectus APR 2024)(Citation: Elastic Latrodectus May 2024)(Citation: Bitsight Latrodectus June 2024)

Groups That Use This Software

ID Name References
G1037 TA577

(Citation: Latrodectus APR 2024)

G1038 TA578

(Citation: Bitsight Latrodectus June 2024) (Citation: Latrodectus APR 2024)

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.