Malware Analysis Report

2024-11-13 14:28

Sample ID 240603-lnx42sad2z
Target 2024-06-03_c99802a8587ccde3cfd18c14e9e48656_snatch
SHA256 bfc7da1951f21e23de0249fc3e5c170c95bb1a72b9984953f9a75560456ca677
Tags
ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

bfc7da1951f21e23de0249fc3e5c170c95bb1a72b9984953f9a75560456ca677

Threat Level: Known bad

The file 2024-06-03_c99802a8587ccde3cfd18c14e9e48656_snatch was found to be: Known bad.

Malicious Activity Summary

ransomware spyware stealer

Renames multiple (144) files with added filename extension

Reads user/profile data of web browsers

Unsigned PE

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-03 09:41

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-03 09:41

Reported

2024-06-03 09:43

Platform

win7-20240508-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-03_c99802a8587ccde3cfd18c14e9e48656_snatch.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-03_c99802a8587ccde3cfd18c14e9e48656_snatch.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-03_c99802a8587ccde3cfd18c14e9e48656_snatch.exe"

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-03 09:41

Reported

2024-06-03 09:44

Platform

win10v2004-20240226-en

Max time kernel

142s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-03_c99802a8587ccde3cfd18c14e9e48656_snatch.exe"

Signatures

Renames multiple (144) files with added filename extension

ransomware

Reads user/profile data of web browsers

spyware stealer

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-03_c99802a8587ccde3cfd18c14e9e48656_snatch.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-03_c99802a8587ccde3cfd18c14e9e48656_snatch.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4240 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
GB 96.16.110.114:80 tcp
N/A 192.168.239.141:22 tcp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 164.189.21.2.in-addr.arpa udp
N/A 192.168.239.141:22 tcp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 13.107.253.64:443 tcp
N/A 192.168.239.141:22 tcp
N/A 192.168.239.141:22 tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
N/A 192.168.239.141:22 tcp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
GB 142.250.179.234:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 234.179.250.142.in-addr.arpa udp
N/A 192.168.239.141:22 tcp
N/A 192.168.239.141:22 tcp
US 8.8.8.8:53 123.10.44.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\READ THIS.txt

MD5 14d88d6272062b7958e4d4c3fc99ba87
SHA1 721f4bc99b1e45a59c8bb6e8ceb33b6187413cd0
SHA256 97dfac9c19ae78b5c9b4e13a7b417d12e1a52738be3e5f88b2bd39587b3b1549
SHA512 57c9bfb73c191729528feadb7f87200a3583565889da3cdf3574b0055e405623f87914bfb4d3e7eb6a15d4af6a6c9dacb79078484d2078987fda4f9f1ccafa99