Latrodectus Malware Masquerades as AhnLab Security Software to Infect Victims

Latrodectus Malware Masquerades as AhnLab Security Software to Infect Victims

Published on

Published on

Published on

Aug 29, 2024

Aug 29, 2024

Aug 29, 2024

Latrodectus Malware Masquerades as AhnLab Security Software to Infect Victims
Latrodectus Malware Masquerades as AhnLab Security Software to Infect Victims
Latrodectus Malware Masquerades as AhnLab Security Software to Infect Victims

During a recent analysis of known Latrodectus infrastructure, our research team encountered a command-and-control (C2) server at 103.144.139.]189 after pivoting on the TLS certificates. Communicating with this server was a file named MeDExt.dll, detected as the downloader by multiple vendors in VirusTotal.

Leveraging this discovery, we were able to identify additional IP addresses and domains associated with the distribution of Latrodectus malware.

Latrodectus is a downloader that functions as a backdoor, allowing threat actors to execute remote commands, gather information from compromised machines, and deploy additional malicious payloads, the most recent being Brute Ratel C4.

In this blog post, we will examine the malicious DLL and then dive into the C2 infrastructure we uncovered, including the certificate pivot and the associated domains identified during our research.

MeDExt.dll

Unfortunately, we don’t have the initial access method for this attack campaign, but as past reports suggest, phishing and malicious ads are likely entry points into networks.

The DLL file that caught our attention, "MeDExt.dll," mimics the legitimate MeD Engine Extension from AhnLab Smart Defense. Given that this malicious file is a DLL, it's plausible that the legitimate parent executable was bundled with the Latrodectus malware or that this was a targeted attack aimed at a victim known to use AhnLab's services.

https://app.hunt.io/images/blogs/latrodectus/figure_1.webp

Figure 1: VirusTotal results for MeDExt.dll (Source: VirusTotal)

Spoofing a well-known anti-virus vendor increases the malware’s stealth and the likelihood of bypassing security measures, reinforcing the importance of scrutinizing renamed files.

Below is the file signature info. Note the DLL is not signed.

https://app.hunt.io/images/blogs/latrodectus/figure_2.webp

Figure 2: VirusTotal Signature Info for the suspect DLL

The PDB path (provided below) within the MeDExt.dll file offers a glimpse into the environment used by the threat actor(s)

C:\Build\Project\Medicine\Engine\2.0_MainTrunk\building\build\Project\Medicine\Engine\2.0\Trunk\Build\AMD64\free\MeDExt.pdb

The DLL has four exports with differing addresses, all following similar naming paths beginning with “MeDExt..”

https://app.hunt.io/images/blogs/latrodectus/figure_3.webp

Figure 3: Obligatory IDA screenshot showing the DLL’s exports

We could not identify any new TTPs during the analysis of the malicious file. This sample of Latrodectus employed familiar techniques, such as using the Windows Component Object Model (COM) to set a scheduled task for persistence.

Next, we'll examine the communication with the command and control infrastructure.

Command & Control Infrastructure Analysis

After running the file through multiple sandboxes, we observed Lactrodecuts attempting to communicate with the following domains + URLs:

  • stripplasst.]com/live/

  • coolarition.]com/live/

stripplasst.]com was registered through the OwnRegistrar, Inc. registrar, and coolarition[.]com through PDR Ltd. This consistent use of a single registrar should be used as a low-confidence indicator in tracking and attributing related malicious activity.

Both domains were unavailable during analysis, though we captured the first POST request to the C2 registering the victim's details in a PCAP, as seen below.

The IP address, 103.144.139.]189 for a short period resolved to the domain riscoarchez[.]com, also identified in a Latrodecuts attack paired with Brute Ratel C4 by Rapid7.
https://app.hunt.io/images/blogs/latrodectus/figure_4.webp

Figure 4: PCAP showing the initial registration request to one of the C2 domains.

The server that initiated our investigation is hosted on the Gigabit Hosting Sdn Bhd ASN.

https://app.hunt.io/images/blogs/latrodectus/figure_5.webp

Figure 5: Initial IP that began our research (Link: here)

As reported by ProofPoint in their joint blog post with Team Cymru, we can see the server also has ports 443 and 8080 open, which were one of the criteria used to search for additional C2 servers in the article.

Moving to the SSL History, we noticed a semi-unique certificate on port 443. We say “semi” because many malware families use the “Internet Widgits Pty Ltd” Issuer Organization name in their self-signed certificates.

https://app.hunt.io/images/blogs/latrodectus/figure_6.webp

Figure 6: Hunt certificate data for 103.144.139.]189 (Try it here)

The complete certificate fields are below:

  • Subject Common Name: localhost

  • Subject Country: AU

  • Subject Organization: Internet Widgits Pty Ltd

  • Subject Organisational Unit: N/A

  • Subject Locality: N/A

  • Subject State: Some-State

We can use Hunt's Advanced Search feature to craft a query that will assist us in identifying servers using similar certificates as the above.

In the case of the Latrodectus C2 certs, we came up with the following query based on the JA4X hash and Subject Common Name:

ja4x:"96a6439c8f5c_96a6439c8f5c_795797892f9c" AND subject.common_name:"localhost"

https://app.hunt.io/images/blogs/latrodectus/figure_7.webp

Figure 7: Hunt Advanced Search Results for the suspicious Latrodectus linked certificate (Try it out here)

The query returns just 24 results, suggesting we're on the right track in identifying Latrodectus servers. However, it's important to note that the certificate fields we're analyzing are commonly used for legitimate purposes and by other threat actors.

We cannot confirm that all results are linked to the malware; further investigation is required.

Poking around for similar server + certificate combinations on the same ASN as our initial IP, we found a malicious file mimicking the Google Authenticator app, also associated with Latrodectus communicating with 103.144.139.]182.

The domain spikeliftall.]com resolves to the IP mentioned above, registered through PDR Ltd.

https://app.hunt.io/images/blogs/latrodectus/figure_8.webp

Figure 8: Another Lactrodectus C2 on the same ASN (Source: VirusTotal)

Again, this server also had port characteristics (443 & 8080) and a matching certificate seen with other command and control infrastructure.

On Aug 13, 2024, Symantec also noticed this campaign releasing a Protection Bulletin identifying the initial access vector as phishing.

After submitting a few IP addresses to VirusTotal for analysis, another server with a file detected as Latrodectus caught our attention.

https://app.hunt.io/images/blogs/latrodectus/figure_9.webp

Figure 9: Additional suspicious IP associated with Latrodetus

The IP, hosted on BlueVPS OU, resolves to a single domain, worlpquano.]com registered through HOSTINGER, and used CloudFlare services in mid-July 2024.

https://app.hunt.io/images/blogs/latrodectus/figure_10.webp

Figure 10: Third IP/domain associated with Latrodecuts scan results (Source: VirusTotal)

Conclusion

Latrodectus’ tactic of impersonating legitimate security software highlights the persistent challenge of distinguishing between trusted and malicious files. Effective defense against such threats requires continuous monitoring and detailed analysis of network activity.

Request a demo today to get a closer look at how the Hunt platform can strengthen your defenses.

Network Observables

IP AddressDomain(s)Domain RegistrarASNNotes
103.144.139.]189:443riscoarchez.]comOwn RegistrarGigabit Hosting Sdn BhdInitial IP that started investigation.
188.114.97.]7:443stripplasst.]comOwn RegistrarCloudFlareC2 for MeDExt.dll
188.114.97.]7:443,
84.32.41.]12:443
coolarition.]comPDR Ltd.CloudFlare, Hostgnome LtdC2 for MeDExt.dll
103.144.139.]182:443spikeliftall.]comPDR Ltd.Gigabit Hosting Sdn BhdJarm fingerprint + HTML response hash
45.129.199.]25:443worlpquano.]comHOSTINGERBlueVPS OUIdentified as a possible Latrodectus C2 by Symantec

Host Observables

File NameSHA-256 HashNotes
MeDExt.dll23546ec67474ed6788a14c9410f3fc458b5c5ff8bd13885100fb4f3e930a30bfSeen communicating with
riscoarchez.]com/live/
stripplasst.]com/live/
coolartiion.]com/live/
GoogleAuthSetup.ex62536e1486be7e31df6c111ed96777b9e3f2a912a2d7111253ae6a5519e71830Seen communicating with
steamcommunity.]com/profiles/76561199619773134
godfaetret.]com/live/
spikeliftall.]com/live/
confrontation_d46a184c.exea459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7Seen communicating with
worlpquano.]com/live/
carflotyup.]com/live/

During a recent analysis of known Latrodectus infrastructure, our research team encountered a command-and-control (C2) server at 103.144.139.]189 after pivoting on the TLS certificates. Communicating with this server was a file named MeDExt.dll, detected as the downloader by multiple vendors in VirusTotal.

Leveraging this discovery, we were able to identify additional IP addresses and domains associated with the distribution of Latrodectus malware.

Latrodectus is a downloader that functions as a backdoor, allowing threat actors to execute remote commands, gather information from compromised machines, and deploy additional malicious payloads, the most recent being Brute Ratel C4.

In this blog post, we will examine the malicious DLL and then dive into the C2 infrastructure we uncovered, including the certificate pivot and the associated domains identified during our research.

MeDExt.dll

Unfortunately, we don’t have the initial access method for this attack campaign, but as past reports suggest, phishing and malicious ads are likely entry points into networks.

The DLL file that caught our attention, "MeDExt.dll," mimics the legitimate MeD Engine Extension from AhnLab Smart Defense. Given that this malicious file is a DLL, it's plausible that the legitimate parent executable was bundled with the Latrodectus malware or that this was a targeted attack aimed at a victim known to use AhnLab's services.

https://app.hunt.io/images/blogs/latrodectus/figure_1.webp

Figure 1: VirusTotal results for MeDExt.dll (Source: VirusTotal)

Spoofing a well-known anti-virus vendor increases the malware’s stealth and the likelihood of bypassing security measures, reinforcing the importance of scrutinizing renamed files.

Below is the file signature info. Note the DLL is not signed.

https://app.hunt.io/images/blogs/latrodectus/figure_2.webp

Figure 2: VirusTotal Signature Info for the suspect DLL

The PDB path (provided below) within the MeDExt.dll file offers a glimpse into the environment used by the threat actor(s)

C:\Build\Project\Medicine\Engine\2.0_MainTrunk\building\build\Project\Medicine\Engine\2.0\Trunk\Build\AMD64\free\MeDExt.pdb

The DLL has four exports with differing addresses, all following similar naming paths beginning with “MeDExt..”

https://app.hunt.io/images/blogs/latrodectus/figure_3.webp

Figure 3: Obligatory IDA screenshot showing the DLL’s exports

We could not identify any new TTPs during the analysis of the malicious file. This sample of Latrodectus employed familiar techniques, such as using the Windows Component Object Model (COM) to set a scheduled task for persistence.

Next, we'll examine the communication with the command and control infrastructure.

Command & Control Infrastructure Analysis

After running the file through multiple sandboxes, we observed Lactrodecuts attempting to communicate with the following domains + URLs:

  • stripplasst.]com/live/

  • coolarition.]com/live/

stripplasst.]com was registered through the OwnRegistrar, Inc. registrar, and coolarition[.]com through PDR Ltd. This consistent use of a single registrar should be used as a low-confidence indicator in tracking and attributing related malicious activity.

Both domains were unavailable during analysis, though we captured the first POST request to the C2 registering the victim's details in a PCAP, as seen below.

The IP address, 103.144.139.]189 for a short period resolved to the domain riscoarchez[.]com, also identified in a Latrodecuts attack paired with Brute Ratel C4 by Rapid7.
https://app.hunt.io/images/blogs/latrodectus/figure_4.webp

Figure 4: PCAP showing the initial registration request to one of the C2 domains.

The server that initiated our investigation is hosted on the Gigabit Hosting Sdn Bhd ASN.

https://app.hunt.io/images/blogs/latrodectus/figure_5.webp

Figure 5: Initial IP that began our research (Link: here)

As reported by ProofPoint in their joint blog post with Team Cymru, we can see the server also has ports 443 and 8080 open, which were one of the criteria used to search for additional C2 servers in the article.

Moving to the SSL History, we noticed a semi-unique certificate on port 443. We say “semi” because many malware families use the “Internet Widgits Pty Ltd” Issuer Organization name in their self-signed certificates.

https://app.hunt.io/images/blogs/latrodectus/figure_6.webp

Figure 6: Hunt certificate data for 103.144.139.]189 (Try it here)

The complete certificate fields are below:

  • Subject Common Name: localhost

  • Subject Country: AU

  • Subject Organization: Internet Widgits Pty Ltd

  • Subject Organisational Unit: N/A

  • Subject Locality: N/A

  • Subject State: Some-State

We can use Hunt's Advanced Search feature to craft a query that will assist us in identifying servers using similar certificates as the above.

In the case of the Latrodectus C2 certs, we came up with the following query based on the JA4X hash and Subject Common Name:

ja4x:"96a6439c8f5c_96a6439c8f5c_795797892f9c" AND subject.common_name:"localhost"

https://app.hunt.io/images/blogs/latrodectus/figure_7.webp

Figure 7: Hunt Advanced Search Results for the suspicious Latrodectus linked certificate (Try it out here)

The query returns just 24 results, suggesting we're on the right track in identifying Latrodectus servers. However, it's important to note that the certificate fields we're analyzing are commonly used for legitimate purposes and by other threat actors.

We cannot confirm that all results are linked to the malware; further investigation is required.

Poking around for similar server + certificate combinations on the same ASN as our initial IP, we found a malicious file mimicking the Google Authenticator app, also associated with Latrodectus communicating with 103.144.139.]182.

The domain spikeliftall.]com resolves to the IP mentioned above, registered through PDR Ltd.

https://app.hunt.io/images/blogs/latrodectus/figure_8.webp

Figure 8: Another Lactrodectus C2 on the same ASN (Source: VirusTotal)

Again, this server also had port characteristics (443 & 8080) and a matching certificate seen with other command and control infrastructure.

On Aug 13, 2024, Symantec also noticed this campaign releasing a Protection Bulletin identifying the initial access vector as phishing.

After submitting a few IP addresses to VirusTotal for analysis, another server with a file detected as Latrodectus caught our attention.

https://app.hunt.io/images/blogs/latrodectus/figure_9.webp

Figure 9: Additional suspicious IP associated with Latrodetus

The IP, hosted on BlueVPS OU, resolves to a single domain, worlpquano.]com registered through HOSTINGER, and used CloudFlare services in mid-July 2024.

https://app.hunt.io/images/blogs/latrodectus/figure_10.webp

Figure 10: Third IP/domain associated with Latrodecuts scan results (Source: VirusTotal)

Conclusion

Latrodectus’ tactic of impersonating legitimate security software highlights the persistent challenge of distinguishing between trusted and malicious files. Effective defense against such threats requires continuous monitoring and detailed analysis of network activity.

Request a demo today to get a closer look at how the Hunt platform can strengthen your defenses.

Network Observables

IP AddressDomain(s)Domain RegistrarASNNotes
103.144.139.]189:443riscoarchez.]comOwn RegistrarGigabit Hosting Sdn BhdInitial IP that started investigation.
188.114.97.]7:443stripplasst.]comOwn RegistrarCloudFlareC2 for MeDExt.dll
188.114.97.]7:443,
84.32.41.]12:443
coolarition.]comPDR Ltd.CloudFlare, Hostgnome LtdC2 for MeDExt.dll
103.144.139.]182:443spikeliftall.]comPDR Ltd.Gigabit Hosting Sdn BhdJarm fingerprint + HTML response hash
45.129.199.]25:443worlpquano.]comHOSTINGERBlueVPS OUIdentified as a possible Latrodectus C2 by Symantec

Host Observables

File NameSHA-256 HashNotes
MeDExt.dll23546ec67474ed6788a14c9410f3fc458b5c5ff8bd13885100fb4f3e930a30bfSeen communicating with
riscoarchez.]com/live/
stripplasst.]com/live/
coolartiion.]com/live/
GoogleAuthSetup.ex62536e1486be7e31df6c111ed96777b9e3f2a912a2d7111253ae6a5519e71830Seen communicating with
steamcommunity.]com/profiles/76561199619773134
godfaetret.]com/live/
spikeliftall.]com/live/
confrontation_d46a184c.exea459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7Seen communicating with
worlpquano.]com/live/
carflotyup.]com/live/

Related Posts:

GreenSpot APT Targets 163.com Users with Fake Download Pages & Spoofed Domains
Feb 4, 2025

GreenSpot APT targets 163.com users via fake download pages and domain spoofing. Learn their tactics, risks, and how to protect your email accounts.

GreenSpot APT Targets 163.com Users with Fake Download Pages & Spoofed Domains
Feb 4, 2025

GreenSpot APT targets 163.com users via fake download pages and domain spoofing. Learn their tactics, risks, and how to protect your email accounts.

Unlock SSL Intelligence: How SSL History Boosts Threat Hunting
Jan 30, 2025

Explore how SSL intelligence and SSL history empower proactive threat hunting. Learn tools, real-world examples, and strategies to track cyber threats.

Unlock SSL Intelligence: How SSL History Boosts Threat Hunting
Jan 30, 2025

Explore how SSL intelligence and SSL history empower proactive threat hunting. Learn tools, real-world examples, and strategies to track cyber threats.

Unmasking SparkRAT: Detection & macOS Campaign Insights
Jan 28, 2025

Explore SparkRAT detection tactics, macOS targeting, and insights into recent DPRK-linked campaigns with actionable research findings.

Unmasking SparkRAT: Detection & macOS Campaign Insights
Jan 28, 2025

Explore SparkRAT detection tactics, macOS targeting, and insights into recent DPRK-linked campaigns with actionable research findings.

Suspected KEYPLUG Infrastructure: TLS Certificates and GhostWolf Links
Jan 23, 2025

Uncover how Hunt’s TLS records reveal patterns in suspected KEYPLUG infrastructure, linking GhostWolf and RedGolf/APT41 to ongoing activity.

Suspected KEYPLUG Infrastructure: TLS Certificates and GhostWolf Links
Jan 23, 2025

Uncover how Hunt’s TLS records reveal patterns in suspected KEYPLUG infrastructure, linking GhostWolf and RedGolf/APT41 to ongoing activity.

GreenSpot APT Targets 163.com Users with Fake Download Pages & Spoofed Domains
Feb 4, 2025

GreenSpot APT targets 163.com users via fake download pages and domain spoofing. Learn their tactics, risks, and how to protect your email accounts.

Unlock SSL Intelligence: How SSL History Boosts Threat Hunting
Jan 30, 2025

Explore how SSL intelligence and SSL history empower proactive threat hunting. Learn tools, real-world examples, and strategies to track cyber threats.