General

  • Target

    2024-05-12_54cdcbef9065668b75b2a2b8e72ac3cc_ngrbot_snatch

  • Size

    9.5MB

  • Sample

    240512-ykhleage54

  • MD5

    54cdcbef9065668b75b2a2b8e72ac3cc

  • SHA1

    912c98eb436b1e21e9e1a84f6252273eb76577fb

  • SHA256

    9fc4454099317d7154d8c703c128850f9c0f3536e831619313224b2e7947bc28

  • SHA512

    1fabe68c1121830bb8693ff83adbbd770df3d1a61a41c2412329dec8d73ce9ddc4bef3033c2630575bcc6fd7cfbba4a64af9dd82eefbb6b601d0c9759c8ce81b

  • SSDEEP

    98304:m/lSsz0v691HcrORvs0SSK2g8Rw3EplwSF8S1jC:9e0v6vKes0SSvgSplz1jC

Malware Config

Targets

    • Target

      2024-05-12_54cdcbef9065668b75b2a2b8e72ac3cc_ngrbot_snatch

    • Size

      9.5MB

    • MD5

      54cdcbef9065668b75b2a2b8e72ac3cc

    • SHA1

      912c98eb436b1e21e9e1a84f6252273eb76577fb

    • SHA256

      9fc4454099317d7154d8c703c128850f9c0f3536e831619313224b2e7947bc28

    • SHA512

      1fabe68c1121830bb8693ff83adbbd770df3d1a61a41c2412329dec8d73ce9ddc4bef3033c2630575bcc6fd7cfbba4a64af9dd82eefbb6b601d0c9759c8ce81b

    • SSDEEP

      98304:m/lSsz0v691HcrORvs0SSK2g8Rw3EplwSF8S1jC:9e0v6vKes0SSvgSplz1jC

    • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables Discord URL observed in first stage droppers

    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • Detects executables containing URLs to raw contents of a Github gist

    • Detects executables containing possible sandbox system UUIDs

    • Detects executables referencing virtualization MAC addresses

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks