Latrodectus is a Windows malware downloader that has been used since at least 2023 to download and execute additional payloads and modules. Latrodectus has most often been distributed through email campaigns, primarily by TA577 and TA578, and has infrastructure overlaps with historic IcedID operations.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
Latrodectus has used WMI in malicious email infection chains to facilitate the installation of remotely-hosted files.[4][3] |
|
| Enterprise | T1005 | 从本地系统获取数据 |
Latrodectus can collect data from a compromised host using a stealer module.[3] |
|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
Latrodectus has been packed to appear as a component to Bitdefender’s kernel-mode driver, TRUFOS.SYS.[4] |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
Latrodectus can send RC4 encrypted data over C2 channels.[1][4][3] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Latrodectus has the ability to deobfuscate encrypted strings.[1][4][3] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Latrodectus can set an AutoRun key to establish persistence.[1] |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
The Latrodectus command handler can use |
| .007 | 命令与脚本解释器: JavaScript |
Latrodectus has used JavaScript files as part its infection chain during malicious spam email campaigns.[4][3][5] |
||
| Enterprise | T1482 | 域信任发现 |
Latrodectus can run |
|
| Enterprise | T1104 | 多阶段信道 |
Latrodectus has used a two-tiered C2 configuration with tier one nodes connecting to the victim and tier two nodes connecting to backend infrastructure.[1] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Latrodectus can send registration information to C2 via HTTP |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
Latrodectus has Base64-encoded the message body of a HTTP request sent to C2.[1][4] |
| Enterprise | T1083 | 文件和目录发现 |
Latrodectus can collect desktop filenames.[1][3][4] |
|
| Enterprise | T1106 | 本机API |
Latrodectus has used multiple Windows API post exploitation including |
|
| Enterprise | T1069 | .002 | 权限组发现: Domain Groups |
Latrodectus can identify domain groups through |
| Enterprise | T1027 | .001 | 混淆文件或信息: Binary Padding |
Latrodectus has been obfuscated with a 129 byte sequence of junk data prepended to the file.[4] |
| .002 | 混淆文件或信息: Software Packing |
The Latrodectus payload has been packed for obfuscation.[4] |
||
| .007 | 混淆文件或信息: Dynamic API Resolution |
Latrodectus can resolve Windows APIs dynamically by hash.[1] |
||
| .013 | 混淆文件或信息: Encrypted/Encoded File |
Latrodectus has used a pseudo random number generator (PRNG) algorithm and a rolling XOR key to obfuscate strings.[1][4][3] |
||
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
Latrodectus has been executed through malicious links distributed in email campaigns.[1][2] |
| .002 | 用户执行: Malicious File |
Latrodectus has lured users into opening malicious email attachments for execution.[2] |
||
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Latrodectus has the ability to delete itself.[4][3] |
| Enterprise | T1218 | .007 | 系统二进制代理执行: Msiexec |
Latrodectus has called |
| .011 | 系统二进制代理执行: Rundll32 |
Latrodectus can use rundll32.exe to execute downloaded DLLs.[4][2] |
||
| Enterprise | T1082 | 系统信息发现 |
Latrodectus can gather operating system information.[1][4][4][3] |
|
| Enterprise | T1529 | 系统关机/重启 |
Latrodectus has the ability to restart compromised hosts.[4] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
Latrodectus can discover the username of an infected host.[4] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Latrodectus can discover the IP and MAC address of a targeted host.[4][3] |
|
| Enterprise | T1135 | 网络共享发现 |
Latrodectus can run |
|
| Enterprise | T1102 | 网络服务 |
Latrodectus has used Google Firebase to download malicious installation scripts.[5] |
|
| Enterprise | T1497 | .001 | 虚拟化/沙盒规避: System Checks |
Latrodectus can determine if it is running in a virtualized environment by checking the OS version, checking the number of running processes, ensuring a 64-bit application is running on a 64-bit host, and checking if the host has a valid MAC address.[1][4][3] |
| Enterprise | T1622 | 调试器规避 |
Latrodectus has the ability to check for the presence of debuggers.[1] |
|
| Enterprise | T1087 | .002 | 账号发现: Domain Account |
Latrodectus can run |
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
Latrodectus has the ability to identify installed antivirus products.[4][3] |
| Enterprise | T1105 | 输入工具传输 |
Latrodectus can download and execute PEs, DLLs, and shellcode from C2.[1][4][3] |
|
| Enterprise | T1057 | 进程发现 |
Latrodectus can enumerate running processes including process grandchildren on targeted hosts.[1][4][3] |
|
| Enterprise | T1559 | .001 | 进程间通信: Component Object Model |
Latrodectus can use the Windows Component Object Model (COM) to set scheduled tasks.[4][3] |
| Enterprise | T1021 | .005 | 远程服务: VNC |
Latrodectus has routed C2 traffic using Keyhole VNC.[5] |
| Enterprise | T1041 | 通过C2信道渗出 |
Latrodectus can exfiltrate encrypted system information to the C2 server.[1][3] |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
Latrodectus has been distributed through reply-chain phishing emails with malicious attachments.[2] |
| .002 | 钓鱼: Spearphishing Link |
Latrodectus has been distributed to victims through emails containing malicious links.[1][2] |
||
| Enterprise | T1564 | .004 | 隐藏伪装: NTFS File Attributes |
Latrodectus can delete itself while its process is still running through the use of an alternate data stream.[4] |
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Latrodectus can create scheduled tasks for persistence.[1][4][3] |