General
-
Target
2024-06-25_b828a4d1a49574647d1bd6a6990334d7_ngrbot_poet-rat_snatch
-
Size
9.5MB
-
Sample
240625-y2n5hstbjj
-
MD5
b828a4d1a49574647d1bd6a6990334d7
-
SHA1
e35c99ecbefb1d7ce83f519d48098d1a3c005886
-
SHA256
b571568f26f4b1eb13265c1699d3aa9cc63448b1e4979ebfc7c5ec5617685528
-
SHA512
d2618681fb9dbf62276991bc89f05d02fb6ace08b0b51eb721d10d2dc1b222955b6cfc90eec3fbc3f7f38d7e6b6ffb720995f5dbf22eb18a39bd34badf8baff0
-
SSDEEP
98304:hKTBQiVfr1oo2uvxXKWOwCu5eEgG8zSF8h2nR3:UjVfr1NKWOwj5bv8juR3
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-25_b828a4d1a49574647d1bd6a6990334d7_ngrbot_poet-rat_snatch.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-25_b828a4d1a49574647d1bd6a6990334d7_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1253312688864497665/375hzY1fiOjkE25L3-nbomdQUITdEzw5TbF9fCfxMycDpfz09qByG-R9KOpVUwhbMOaj
Targets
-
-
Target
2024-06-25_b828a4d1a49574647d1bd6a6990334d7_ngrbot_poet-rat_snatch
-
Size
9.5MB
-
MD5
b828a4d1a49574647d1bd6a6990334d7
-
SHA1
e35c99ecbefb1d7ce83f519d48098d1a3c005886
-
SHA256
b571568f26f4b1eb13265c1699d3aa9cc63448b1e4979ebfc7c5ec5617685528
-
SHA512
d2618681fb9dbf62276991bc89f05d02fb6ace08b0b51eb721d10d2dc1b222955b6cfc90eec3fbc3f7f38d7e6b6ffb720995f5dbf22eb18a39bd34badf8baff0
-
SSDEEP
98304:hKTBQiVfr1oo2uvxXKWOwCu5eEgG8zSF8h2nR3:UjVfr1NKWOwj5bv8juR3
Score10/10-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-