General
-
Target
2024-06-24_8cc716ca671d1fcdf2ac74ddea807572_ngrbot_poet-rat_snatch
-
Size
14.2MB
-
Sample
240624-bw79watbjc
-
MD5
8cc716ca671d1fcdf2ac74ddea807572
-
SHA1
cf259ccc5c988176330be8a09e4b4daa89e37016
-
SHA256
7776a6fbb3b3f62999ae1cf161f2f24dbf293b64e5318cbe01cc896e8b94a5cd
-
SHA512
6efc88379b6efde4c14cb73c3806d833dab4533a45dac8027d3295e440143f203d01044bd46fff5cee665112059696afa08d8221d8cd9d1e04c0f9dc3fc86813
-
SSDEEP
196608:uwtgC4XNzUQSl/46ilCVja1nNwaDx7cfOTwikF41zxJ4VuWw:uWgf36isM1eaDYOTwD4Nr4Vu
Behavioral task
behavioral1
Sample
2024-06-24_8cc716ca671d1fcdf2ac74ddea807572_ngrbot_poet-rat_snatch.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-24_8cc716ca671d1fcdf2ac74ddea807572_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1238037759172677703/rKp9kf1vq9un4cYkXgVxTBjN0xe14L5JjHXRHQdqnx5G8M9mmbHi-MtgKRzSMsD9jOEb
Targets
-
-
Target
2024-06-24_8cc716ca671d1fcdf2ac74ddea807572_ngrbot_poet-rat_snatch
-
Size
14.2MB
-
MD5
8cc716ca671d1fcdf2ac74ddea807572
-
SHA1
cf259ccc5c988176330be8a09e4b4daa89e37016
-
SHA256
7776a6fbb3b3f62999ae1cf161f2f24dbf293b64e5318cbe01cc896e8b94a5cd
-
SHA512
6efc88379b6efde4c14cb73c3806d833dab4533a45dac8027d3295e440143f203d01044bd46fff5cee665112059696afa08d8221d8cd9d1e04c0f9dc3fc86813
-
SSDEEP
196608:uwtgC4XNzUQSl/46ilCVja1nNwaDx7cfOTwikF41zxJ4VuWw:uWgf36isM1eaDYOTwD4Nr4Vu
Score10/10-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-