General

  • Target

    2024-05-14_de835c5e977c63ad052bfac57a6511c8_ngrbot_snatch

  • Size

    9.5MB

  • Sample

    240514-pclteseg41

  • MD5

    de835c5e977c63ad052bfac57a6511c8

  • SHA1

    57197fb2131ae5174a163cdc0301c802b56cb02e

  • SHA256

    c9b0218b6aee171b0779953a559ffe1177d610bf6dfeb63a7931973eb989fe86

  • SHA512

    c6c3e356bb61a657b1923e0e08858b53c6fedcfc5f83873938fbd6cc0c870d985ad44685584b9ffc128ca9dd70e90c9d284f0c55fa21bd37e5e5d9f57d319d45

  • SSDEEP

    98304:gOtqibwOi+sMIyD+Rk7Jok5lE9fqFgqaqDjFy:h5bwOYRFRk7JT5W9Q5DjF

Malware Config

Targets

    • Target

      2024-05-14_de835c5e977c63ad052bfac57a6511c8_ngrbot_snatch

    • Size

      9.5MB

    • MD5

      de835c5e977c63ad052bfac57a6511c8

    • SHA1

      57197fb2131ae5174a163cdc0301c802b56cb02e

    • SHA256

      c9b0218b6aee171b0779953a559ffe1177d610bf6dfeb63a7931973eb989fe86

    • SHA512

      c6c3e356bb61a657b1923e0e08858b53c6fedcfc5f83873938fbd6cc0c870d985ad44685584b9ffc128ca9dd70e90c9d284f0c55fa21bd37e5e5d9f57d319d45

    • SSDEEP

      98304:gOtqibwOi+sMIyD+Rk7Jok5lE9fqFgqaqDjFy:h5bwOYRFRk7JT5W9Q5DjF

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks