General
-
Target
2024-06-26_3df7235123bbc4c52d379fe372ac0045_ngrbot_poet-rat_snatch
-
Size
9.5MB
-
Sample
240626-a7b55sxamk
-
MD5
3df7235123bbc4c52d379fe372ac0045
-
SHA1
da818e86cf02fffcacbe468b8bb63e7a1da91ad9
-
SHA256
daf5ea8c5e1f7bdf0a5f12c8671b14642d6e3349390629da9f7dc754e610fafd
-
SHA512
a3f86b6a3afe12098f503edcc96c585b8fef60fd23dcb03653888c8e63e977f8d4b23fc8803acfc41f59f8923401ab7978342c4b9e7fd7a0357070950d7d0558
-
SSDEEP
98304:FcJW4J6EdbyvYB8LY0iyo4tTEyzxqFgzC13h:QnJ6EIwAY0iyrtAyzPC13h
Behavioral task
behavioral1
Sample
2024-06-26_3df7235123bbc4c52d379fe372ac0045_ngrbot_poet-rat_snatch.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-26_3df7235123bbc4c52d379fe372ac0045_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1238433893808607232/L-4VX5UhdUB3u0Rm9Q2PK-IFjyExOgtlCYofIfDjLcneVNTB6DlwIRxcFxSylsPnZ2GS
Targets
-
-
Target
2024-06-26_3df7235123bbc4c52d379fe372ac0045_ngrbot_poet-rat_snatch
-
Size
9.5MB
-
MD5
3df7235123bbc4c52d379fe372ac0045
-
SHA1
da818e86cf02fffcacbe468b8bb63e7a1da91ad9
-
SHA256
daf5ea8c5e1f7bdf0a5f12c8671b14642d6e3349390629da9f7dc754e610fafd
-
SHA512
a3f86b6a3afe12098f503edcc96c585b8fef60fd23dcb03653888c8e63e977f8d4b23fc8803acfc41f59f8923401ab7978342c4b9e7fd7a0357070950d7d0558
-
SSDEEP
98304:FcJW4J6EdbyvYB8LY0iyo4tTEyzxqFgzC13h:QnJ6EIwAY0iyrtAyzPC13h
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables Discord URL observed in first stage droppers
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers
-
Detects executables containing URLs to raw contents of a Github gist
-
Detects executables containing possible sandbox system UUIDs
-
Detects executables referencing virtualization MAC addresses
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1