Static task
static1
Behavioral task
behavioral1
Sample
2024-05-03_93df3b40111a8657e692a1c957b65f65_rex_snatch.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-03_93df3b40111a8657e692a1c957b65f65_rex_snatch.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-03_93df3b40111a8657e692a1c957b65f65_rex_snatch
-
Size
23.5MB
-
MD5
93df3b40111a8657e692a1c957b65f65
-
SHA1
2fdbe9414594235a8588f65ed20258b114dc5771
-
SHA256
f5d3cb934d324b20baf4ab98b40d7747b71942847f21fe8a5b0387fdf1cf570a
-
SHA512
fd09d0837e8ac41d6dd8013644bcedaf01f25171686be71b070517965c164c8042c020c6ad6e62041076770962d0eda0bc3ab4e0b7a46bf7d1f611f3df9f1c06
-
SSDEEP
98304:HM5vBeBXro33+JRk/6vlzHb37sgB0nEEeMFsKTFUjm6z9knCi7HIkPk:sTeNzRp739W9eMFsKKjmAiU
Malware Config
Signatures
-
Detects executables containing URLs to raw contents of a Github gist 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-03_93df3b40111a8657e692a1c957b65f65_rex_snatch
Files
-
2024-05-03_93df3b40111a8657e692a1c957b65f65_rex_snatch.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 8.0MB - Virtual size: 8.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14.9MB - Virtual size: 14.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 523KB - Virtual size: 932KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 157KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.symtab Size: 512B - Virtual size: 4B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ