Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Latrodectus

Latrodectus

Latrodectus is a Windows malware downloader that has been used since at least 2023 to download and execute additional payloads and modules.Latrodectus has most often been distributed through email campaigns, primarily byTA577 andTA578, and has infrastructure overlaps with historicIcedID operations.[1][2][3]

ID: S1160
Associated Software: IceNova, Unidentified 111
Type: MALWARE
Platforms: Windows
Contributors: Riku Katsuse, NEC Corporation; Sareena Karapoola, NEC Corporation India; Pooja Natarajan, NEC Corporation India; Cris Tomboc, Truswave SpiderLabs
Version: 1.0
Created: 16 September 2024
Last Modified: 30 September 2024

Associated Software Descriptions

NameDescription
IceNova

[2]

Unidentified 111

[2]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1087.002Account Discovery:Domain Account

Latrodectus can runC:\Windows\System32\cmd.exe /c net group "Domain Admins" /domain to identify domain administrator accounts.[4]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

Latrodectus can send registration information to C2 via HTTPPOST.[1][4][3]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Latrodectus can set an AutoRun key to establish persistence.[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

TheLatrodectus command handler can usecmdexe to run multiple discovery commands.[4][3]

.007Command and Scripting Interpreter:JavaScript

Latrodectus has used JavaScript files as part its infection chain during malicious spam
email campaigns.[4][3][5]

EnterpriseT1132.001Data Encoding:Standard Encoding

Latrodectus has Base64-encoded the message body of a HTTP request sent to C2.[1][4]

EnterpriseT1005Data from Local System

Latrodectus can collect data from a compromised host using a stealer module.[3]

EnterpriseT1622Debugger Evasion

Latrodectus has the ability to check for the presence of debuggers.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

Latrodectus has the ability to deobfuscate encrypted strings.[1][4][3]

EnterpriseT1482Domain Trust Discovery

Latrodectus can runC:\Windows\System32\cmd.exe /c nltest /domain_trusts to discover domain trusts.[4][3]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

Latrodectus can send RC4 encrypted data over C2 channels.[1][4][3]

EnterpriseT1041Exfiltration Over C2 Channel

Latrodectus can exfiltrate encrypted system information to the C2 server.[1][3]

EnterpriseT1083File and Directory Discovery

Latrodectus can collect desktop filenames.[1][3][4]

EnterpriseT1564.004Hide Artifacts:NTFS File Attributes

Latrodectus can delete itself while its process is still running through the use of an alternate data stream.[4]

EnterpriseT1070.004Indicator Removal:File Deletion

Latrodectus has the ability to delete itself.[4][3]

EnterpriseT1105Ingress Tool Transfer

Latrodectus can download and execute PEs, DLLs, and shellcode from C2.[1][4][3]

EnterpriseT1559.001Inter-Process Communication:Component Object Model

Latrodectus can use the Windows Component Object Model (COM) to set scheduled tasks.[4][3]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

Latrodectus has been packed to appear as a component to Bitdefender’s kernel-mode driver, TRUFOS.SYS.[4]

EnterpriseT1104Multi-Stage Channels

Latrodectus has used a two-tiered C2 configuration with tier one nodes connecting to the victim and tier two nodes connecting to backend infrastructure.[1]

EnterpriseT1106Native API

Latrodectus has used multiple Windows API post exploitation includingGetAdaptersInfo,CreateToolhelp32Snapshot, andCreateProcessW.[4][3]

EnterpriseT1135Network Share Discovery

Latrodectus can runC:\Windows\System32\cmd.exe /c net view /all to discover network shares.[4][3]

EnterpriseT1027.001Obfuscated Files or Information:Binary Padding

Latrodectus has been obfuscated with a 129 byte sequence of junk data prepended to the file.[4]

.002Obfuscated Files or Information:Software Packing

TheLatrodectus payload has been packed for obfuscation.[4]

.007Obfuscated Files or Information:Dynamic API Resolution

Latrodectus can resolve Windows APIs dynamically by hash.[1]

.013Obfuscated Files or Information:Encrypted/Encoded File

Latrodectus has used a pseudo random number generator (PRNG) algorithm and a rolling XOR key to obfuscate strings.[1][4][3]

EnterpriseT1069.002Permission Groups Discovery:Domain Groups

Latrodectus can identify domain groups throughcmd.exe /c net group "Domain Admins" /domain.[3][4]

EnterpriseT1566.001Phishing:Spearphishing Attachment

Latrodectus has been distributed through reply-chain phishing emails with malicious attachments.[2]

.002Phishing:Spearphishing Link

Latrodectus has been distributed to victims through emails containing malicious links.[1][2]

EnterpriseT1057Process Discovery

Latrodectus can enumerate running processes including process grandchildren on targeted hosts.[1][4][3]

EnterpriseT1021.005Remote Services:VNC

Latrodectus has routed C2 traffic using Keyhole VNC.[5]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

Latrodectus can create scheduled tasks for persistence.[1][4][3]

EnterpriseT1518.001Software Discovery:Security Software Discovery

Latrodectus has the ability to identify installed antivirus products.[4][3]

EnterpriseT1218.007System Binary Proxy Execution:Msiexec

Latrodectus has calledmsiexec to install remotely-hosted MSI files.[1][2]

.011System Binary Proxy Execution:Rundll32

Latrodectus can use rundll32.exe to execute downloaded DLLs.[4][2]

EnterpriseT1082System Information Discovery

Latrodectus can gather operating system information.[1][4][4][3]

EnterpriseT1016System Network Configuration Discovery

Latrodectus can discover the IP and MAC address of a targeted host.[4][3]

EnterpriseT1033System Owner/User Discovery

Latrodectus can discover the username of an infected host.[4]

EnterpriseT1529System Shutdown/Reboot

Latrodectus has the ability to restart compromised hosts.[4]

EnterpriseT1204.001User Execution:Malicious Link

Latrodectus has been executed through malicious links distributed in email campaigns.[1][2]

.002User Execution:Malicious File

Latrodectus has lured users into opening malicious email attachments for execution.[2]

EnterpriseT1497.001Virtualization/Sandbox Evasion:System Checks

Latrodectus can determine if it is running in a virtualized environment by checking the OS version, checking the number of running processes, ensuring a 64-bit application is running on a 64-bit host, and checking if the host has a valid MAC address.[1][4][3]

EnterpriseT1102Web Service

Latrodectus has used Google Firebase to download malicious installation scripts.[5]

EnterpriseT1047Windows Management Instrumentation

Latrodectus has used WMI in malicious email infection chains to facilitate the installation of remotely-hosted files.[4][3]

Groups That Use This Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp