• Post author:
  • Reading time:9 mins read
You are currently viewing Emergence of Latrodectus Malware Loader as IcedID’s Successor in Phishing Campaigns

In recent developments within the cybersecurity landscape, researchers have identified a surge in email phishing campaigns delivering a new malware loader called Latrodectus.

This malware is emerging as a potential successor to the well-known IcedID malware, posing significant concerns for cybersecurity professionals and enthusiasts alike across the globe.

Lets deep dive into this in detail ✌️

Also Read : Google Patches Chrome Zero Day Vulnerability



Infection Chain and Delivery Method

Starting from early March 2024, phishing campaigns employing Latrodectus have been observed.

These campaigns use oversized JavaScript files to exploit Windows Management Instrumentation (WMI) capabilities, invoking msiexec.exe to install a malicious MSI file hosted on a WEBDAV share πŸ˜‘

Latrodectus Malware Detailed Attack Strategy
Latrodectus Malware Detailed Attack Strategy


Researchers from Elastic Security Labs, Daniel Stepanic and Samir Bousseaden, have detailed this infection chain, check out the above image for a detailed understanding of the attack type and its various stages.


Capabilities and Functionality

Latrodectus is equipped with standard functionalities expected from malware loaders.

It can deploy various payloads like QakBot, DarkGate, and PikaBot, facilitating diverse post-exploitation activities.

Detailed analysis of Latrodectus artifacts reveals its focus on system enumeration, execution, and self-deletion techniques.


Evasion Techniques

To evade detection, Latrodectus masquerades as legitimate software libraries, employs source code obfuscation, and performs anti-analysis checks.

These measures ensure it can evade debugging or sandboxed environments, making it more challenging for cybersecurity defenses to detect and mitigate its presence πŸ˜“


Persistence and Command-and-Control

Latrodectus establishes persistence on Windows hosts via scheduled tasks and communicates with a command-and-control (C2) server over HTTPS.

This connection allows it to receive commands for collecting system information, updating, restarting, terminating itself, and executing shellcode, DLL, and executable files.


New Functionalities in Latrodectus Malware

Since its emergence, Latrodectus has incorporated two new commands by enumerating files in the desktop directory and retrieving the entire process ancestry from infected machines.

Notably, it supports a command (ID 18) to download and execute IcedID from the C2 server, suggesting a developmental connection between the two malware families.


Social Engineering and Phishing Campaigns

Forcepoint has analyzed phishing campaigns using invoice-themed email lures to deliver DarkGate malware.

These emails pose as QuickBooks invoices, prompting users to install Java via a malicious JAR file. The JAR file triggers a PowerShell script that downloads and executes DarkGate through an AutoIT script.


Phishing-as-a-Service (PhaaS)

An updated version of the phishing-as-a-service platform Tycoon has been observed, enhancing its detection evasion capabilities.

This platform targets Microsoft 365 and Gmail session cookies, bypassing multi-factor authentication (MFA) protections.

Proofpoint highlights significant obfuscation and dynamic code generation techniques in this new version, making it harder for security systems to identify and block.


Other Malware Campaigns

In March 2024, Google ads impersonating Calendly and Rufus propagated another malware loader known as D3F@ck Loader.

This loader, emerging in January 2024, drops Raccoon Stealer and DanaBot.

The case of D3F@ck Loader illustrates the evolving nature of malware-as-a-service (MaaS), using Extended Validation certificates to bypass security measures.


Emerging Stealer Malware

New stealer malware families like Fletchen Stealer, WaveStealer, zEus Stealer, and Ziraat Stealer have also been identified.

Additionally, the Remcos remote access trojan (RAT) has been using a PrivateLoader module to enhance its capabilities, employing VB scripts, registry alterations, and services to maintain persistence and evade detection.


Conclusion

The rise of Latrodectus and other advanced malware underscores the persistent and evolving threat landscape.

Cybersecurity professionals must stay vigilant and continuously update their defenses to combat these sophisticated threats.

Awareness and proactive measures are crucial in mitigating the risks posed by these emerging malware loaders and social engineering campaigns.

If you found these security learnings valuable, don’t miss out on more exclusive content. Follow us on Twitter and Instagram to stay informed about emerging threats and developments.

Check out the Cyber Safety Section and Subscribe our Newsletter, Join our community and gain access to the latest cybersecurity trends to bolster your defense against evolving threats & associated risks πŸ™‚

This:

Avani Deshpande

Hello to all tech enthusiasts. I'm Avani, and at TheTechDelta, I focus on the critical area of cyber safety & security. Our digital world is filled with both opportunities and risks. My aim is to help you navigate this complex terrain, offering insights from data breaches to identity theft prevention. With TheTechDelta's Cyber Safety section, you can confidently harness technology while ensuring your online world remains secure. Join me, and together, let's foster a safer digital experience.

Leave a Reply