General

  • Target

    2024-05-03_3b33a67e29e825523db48e1919b97cd1_snatch

  • Size

    9.6MB

  • MD5

    3b33a67e29e825523db48e1919b97cd1

  • SHA1

    724447f8f48b4fa4e9b00408b57912c257405344

  • SHA256

    2968f4d671a43d0d610b388a5fed493419c91cc78c2818e2e6cd1ba7239c49e4

  • SHA512

    142459bd3091ac8d50c93b1579a0ea43b89974b1ff5042d8c8fd876179af89bdeb83a2e8dc3cb81986f08a842bf0f448b24d00c2f10bcdd4181f20cd85bef69d

  • SSDEEP

    98304:5pDmFOLhVP2guE7sfiErsdBKXh7ueYE4+EABEtdQ77:COLhVPEEVYd3R40ce77

Score
10/10

Malware Config

Signatures

  • Detects Windows executables referencing non-Windows User-Agents 1 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables Discord URL observed in first stage droppers 1 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Detects executables containing possible sandbox system UUIDs 1 IoCs
  • Detects executables referencing virtualization MAC addresses 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-03_3b33a67e29e825523db48e1919b97cd1_snatch
    .exe windows:6 windows x64 arch:x64

    c2d457ad8ac36fc9f18d45bffcd450c2


    Headers

    Imports

    Sections