Latrodectus Employs New anti-Debugging And Sandbox Evasion Strategies

0
15
Latrodectus Employs New anti-Debugging And Sandbox Evasion Strategies


Latrodectus, a brand new malware loader, has quickly developed since its discovery, probably changing IcedID.

It features a command to obtain IcedID and has undergone a number of iterations, prone to evade detection. 

Extracting configurations from these variations is essential for efficient menace detection, because the Latrodectus malware has developed over the previous 12 months, with new variations launched each few months. 

– Commercial –
SIEM as a ServiceSIEM as a Service

The malware’s distribution chain has remained constant, using JavaScript and MSI droppers to ship the ultimate DLL payload.

The payload itself has undergone adjustments, with the newest model that includes 4 distinctive exports that share the identical deal with and execute the identical core logic.

Defending Your Networks & Endpoints With UnderDefense MDR – Request Free Demo

VMRay Platform’s dynamic analysis reveals the malicious behavior of LatrodectusVMRay Platform’s dynamic analysis reveals the malicious behavior of Latrodectus
VMRay Platform’s dynamic evaluation reveals the malicious habits of Latrodectus

The Latrodectus malware household developed its decryption strategies, transitioning from PRNG-based XOR to rolling XOR and adopting AES-256 CTR.

Moreover, it expanded its command-and-control capabilities with new instructions and eliminated particular self-deletion methods.

It employs a course of rely verify to evade sandboxes by enumerating the Home windows model and terminating if the variety of lively processes falls beneath a threshold particular to the OS.

The VMRay Platform counters this, permitting customers to regulate the background course of rely throughout evaluation.

Latrodectus enumerating Windows OS versionLatrodectus enumerating Windows OS version
Latrodectus enumerating Home windows OS model

The evasion verify verifies if the MAC deal with size is 6 bytes. If not, this system terminates a safety measure to stop unauthorized entry, as non-standard MAC addresses may point out potential threats or vulnerabilities.

The malware checks if it’s being debugged by analyzing the PEB’s BeingDebugged flag and if it’s operating on WOW64, and the verify is likely to be to detect emulation situations.

Checking the running process against IsWow64ProcessChecking the running process against IsWow64Process
Checking the operating course of in opposition to IsWow64Process

Latrodectus initially used a PRNG for string encryption however later switched to a rolling XOR methodology.

At the moment, it employs AES-256 with a hardcoded key and variable IV. Encrypted strings are saved within the .information part with size and IV data previous the encrypted information.

It resolves DLLs and APIs utilizing CRC32 checksums by evaluating filenames and performance exports with hardcoded values. The open-source software HashDB can help in reversing these hashes.

CRC32-based API hashing in LatrodectusCRC32-based API hashing in Latrodectus
CRC32-based API hashing in Latrodectus

By copying itself to the %APPDATA% folder with a singular filename based mostly on the {hardware} ID, it then makes use of COM to create a scheduled process that runs the malware each time the consumer logs on.

It additionally makes use of a hardcoded mutex to stop re-infection and generates distinctive group IDs for every model, which IDs are used to create an FNV1a hash that may be brute-forced to find out the marketing campaign title.

A script was created to generate an enormous wordlist and iterate by way of it to search out the matching hash.

Command handler IDs for more functionalitiesCommand handler IDs for more functionalities
Command handler IDs for extra functionalities

Based on VMray, Latrodectus is a brand new malware loader that makes use of a singular {hardware} ID technology based mostly on quantity serial quantity and a hardcoded fixed, which may self-delete utilizing a way noticed in DarkSide and different malware. 

It communicates with the C2 server utilizing a selected Person Agent string and sends RC4 encrypted information with numerous parameters. The C2 server can ship instructions to the contaminated host to carry out numerous malicious actions.

Run non-public, Actual-time Malware Evaluation in each Home windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

LEAVE A REPLY

Please enter your comment!
Please enter your name here