General

  • Target

    2024-05-07_0e75dc719f1fbe2455edd7dc51029197_ngrbot_snatch

  • Size

    9.4MB

  • MD5

    0e75dc719f1fbe2455edd7dc51029197

  • SHA1

    e966687f3fd36374017eb04680660a439959cf52

  • SHA256

    3f679e111855dca4652af747635819f6132d60ec8de967310f397efca628e706

  • SHA512

    777c8633b929c2d7827a730f4df46b3f63ee00952f2f6f09665368df2224d8290799569a80090df97834d864bac9b7ccb79e85d9f7e2cbb98a0e20a115b9a4de

  • SSDEEP

    98304:Ze00Y03DD+RDMSACNKXX4j19nix1FBp5EyoGpAXET/Ntu:eY03DK6z4eZPalRiDu

Score
10/10

Malware Config

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables Discord URL observed in first stage droppers 1 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Detects executables containing possible sandbox system UUIDs 1 IoCs
  • Detects executables referencing virtualization MAC addresses 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-07_0e75dc719f1fbe2455edd7dc51029197_ngrbot_snatch
    .exe windows:6 windows x64 arch:x64

    c2d457ad8ac36fc9f18d45bffcd450c2


    Headers

    Imports

    Sections