General

  • Target

    2024-06-24_363644765a1d203acca6baf82103e425_poet-rat_snatch

  • Size

    13.7MB

  • MD5

    363644765a1d203acca6baf82103e425

  • SHA1

    690ef4e91f7b975fc8b68310d35bc581ff6ae7bd

  • SHA256

    1544b717459c7d10bf2edd6915d71f2c184e5aa416bd83a16e2039b505bfe185

  • SHA512

    c9a80e0744c4d121b07209679ab61b4d8edd80c0a27e33355ea1a69514bd755cee23b1dff0d7668697cb03246fae31276b772acf00263fc596ab2f35270312d6

  • SSDEEP

    196608:JkF/B867xma7cSfG8qmMP8wJA9C6im8zB:aF/W6128qmMP1hDz

Score
10/10

Malware Config

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables Discord URL observed in first stage droppers 1 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-24_363644765a1d203acca6baf82103e425_poet-rat_snatch
    .exe windows:6 windows x64 arch:x64

    c2d457ad8ac36fc9f18d45bffcd450c2


    Headers

    Imports

    Sections