General

  • Target

    2024-05-04_faa5d362e8fec96dccd1417e2041c832_snatch

  • Size

    9.6MB

  • MD5

    faa5d362e8fec96dccd1417e2041c832

  • SHA1

    67fb1942daf3cb0441b8f3683575e9dd201d6400

  • SHA256

    e449fb370dcc28a1592d38ed1f9d8705c9134d3398643b1c18beabf62f9df078

  • SHA512

    deed85bb7256e552dbb3921e2b00c96ec426628aee6efca8b60849a552a1b966d7a35c67c9eff948dbd0442a35b6a0f43c8e83a6c18ac19ffe07834fc81c5dc8

  • SSDEEP

    98304:fyLjUmJHIF1bksRfAA+D6Zfdcvwp53KzEUPEABEtxatN:SHIF1bNfEsXcgUvc8tN

Score
10/10

Malware Config

Signatures

  • Detects Windows executables referencing non-Windows User-Agents 1 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables Discord URL observed in first stage droppers 1 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Detects executables containing possible sandbox system UUIDs 1 IoCs
  • Detects executables referencing virtualization MAC addresses 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-04_faa5d362e8fec96dccd1417e2041c832_snatch
    .exe windows:6 windows x64 arch:x64

    c2d457ad8ac36fc9f18d45bffcd450c2


    Headers

    Imports

    Sections