Static task
static1
Behavioral task
behavioral1
Sample
2024-06-09_1ccbcdc5bb6dd3135907f805fc072d3f_ngrbot_snatch.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-09_1ccbcdc5bb6dd3135907f805fc072d3f_ngrbot_snatch.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-09_1ccbcdc5bb6dd3135907f805fc072d3f_ngrbot_snatch
-
Size
17.2MB
-
MD5
1ccbcdc5bb6dd3135907f805fc072d3f
-
SHA1
b6cacf12feacfe969c66dd8d4a287d4d2ffbe461
-
SHA256
91f7ba2b1432786f1e81283e7e0b96f9bc0e731fc81d9683d236efd7696689b3
-
SHA512
20052751eb6a1b16f9c345fcfda4f160aa65f135c32fa3b63d356447090e93c64d15da2338664b60c1a9fa2e4d4b3e3b9faa97ce680fb4bd650cb9daf56af7b5
-
SSDEEP
196608:JgbAcABaYqlIbMmCiitlinOQV2vKtTTPH:JgUc4axFW
Malware Config
Signatures
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
Detects executables containing possible sandbox system UUIDs 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_SandboxSystemUUIDs -
Detects executables referencing virtualization MAC addresses 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-09_1ccbcdc5bb6dd3135907f805fc072d3f_ngrbot_snatch
Files
-
2024-06-09_1ccbcdc5bb6dd3135907f805fc072d3f_ngrbot_snatch.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 7.4MB - Virtual size: 7.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9.0MB - Virtual size: 9.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 461KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 349KB - Virtual size: 349KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 512B - Virtual size: 180B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.symtab Size: 512B - Virtual size: 4B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ