There were 247 press releases posted in the last 24 hours and 441,880 in the last 365 days.

ANY.RUN Exposes the Use of Brute Ratel C4 for Loading Latrodectus Malware

DUBAI, DUBAI, UNITED ARAB EMIRATES, July 24, 2024 /EINPresswire.com/ -- ANY.RUN, a leader in cybersecurity solutions, has published a detailed analysis on the use of the Brute Ratel C4 (BRC4) framework to deploy the recently discovered Latrodectus malware loader.

๐๐ซ๐ฎ๐ญ๐ž ๐‘๐š๐ญ๐ž๐ฅ ๐‚๐Ÿ’ ๐ข๐ง ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ
Brute Ratel C4, first introduced in December 2020, is a commercial Command and Control (C2) framework designed for adversarial attack simulations, red-team engagements, and penetration testing. It stands out from other C2 frameworks due to its ability to bypass and avoid EDR solutions.

๐๐ž๐ฐ ๐‹๐š๐ญ๐ซ๐จ๐๐ž๐œ๐ญ๐ฎ๐ฌ ๐Œ๐š๐ฅ๐ฐ๐š๐ซ๐ž ๐‚๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ
Latrodectus, believed to be the successor of the notorious ICEDID malware, has been linked to the same threat actor group. This new loader is used in multi-stage attacks, typically initiated through phishing emails containing malicious JavaScript or PDF files.

๐ˆ๐ง-๐ƒ๐ž๐ฉ๐ญ๐ก ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ ๐จ๐Ÿ ๐‹๐š๐ญ๐ซ๐จ๐๐ž๐œ๐ญ๐ฎ๐ฌ ๐›๐ฒ ๐€๐๐˜.๐‘๐”๐
ANY.RUN's guest expert, Mohamed Talaat, conducted comprehensive research on a complex multi-stage attack involving the Brute Ratel C2 framework and the Latrodectus malware.

The team started by analyzing a malicious MSI file. Using reverse engineering, they uncovered how the badger loaded the Latrodectus loader into memory. Key steps included identifying a hidden DLL, decrypting a payload, and tracing advanced evasion techniques.

๐ˆ๐ฆ๐ฉ๐ฅ๐ข๐œ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ๐จ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ซ๐จ๐Ÿ๐ž๐ฌ๐ฌ๐ข๐จ๐ง๐š๐ฅ๐ฌ
The analysis reveals all the steps in how the Brute Ratel C4 framework's badger component was employed to deploy the Latrodectus malware loader into the victim's system.

Learn more details about the research on ANY.RUNโ€™s blog.

๐€๐›๐จ๐ฎ๐ญ ๐€๐๐˜.๐‘๐”๐
ANY.RUN offers a suite of cybersecurity products, including an interactive sandbox and a Threat Intelligence portal. Trusted by over 400,000 professionals globally, the sandbox provides an efficient and user-friendly platform for analyzing malware targeting both Windows and Linux systems. In addition, ANY.RUN's Threat Intelligence services, comprising Lookup, Feeds, and YARA Search, allow users to gather critical information about threats and respond to incidents with enhanced speed and accuracy.

The ANY.RUN team
ANYRUN FZCO
+1 657-366-5050
email us here
Visit us on social media:
X
YouTube

Legal Disclaimer:

EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.