General
-
Target
2024-06-26_66383700fdfaca06f74a87cb628bb89f_poet-rat_snatch
-
Size
4.9MB
-
Sample
240626-nzywtstcna
-
MD5
66383700fdfaca06f74a87cb628bb89f
-
SHA1
f157bd262904db73a7da388470872386433f094f
-
SHA256
0217f0ab778acfba323a9b444c8661618fc23f23906f16fe46564a86e4b86836
-
SHA512
30894da96435b2fdb8136b2c071d42bae3cca3107d21b176a9529d0af145ee9589a43fda6dde4fd95ed7732ea6b39e8cfac2fbf941e70d95fec1072864c576cf
-
SSDEEP
49152:+ur1PwvIyeo+j+E5p9vTiOHWdC9hHbxCM5EmsMpQMLxA7i:FVo+jXJzWdC9lXEmGMN3
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-26_66383700fdfaca06f74a87cb628bb89f_poet-rat_snatch.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-26_66383700fdfaca06f74a87cb628bb89f_poet-rat_snatch.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
babylonrat
147.185.221.20
Targets
-
-
Target
2024-06-26_66383700fdfaca06f74a87cb628bb89f_poet-rat_snatch
-
Size
4.9MB
-
MD5
66383700fdfaca06f74a87cb628bb89f
-
SHA1
f157bd262904db73a7da388470872386433f094f
-
SHA256
0217f0ab778acfba323a9b444c8661618fc23f23906f16fe46564a86e4b86836
-
SHA512
30894da96435b2fdb8136b2c071d42bae3cca3107d21b176a9529d0af145ee9589a43fda6dde4fd95ed7732ea6b39e8cfac2fbf941e70d95fec1072864c576cf
-
SSDEEP
49152:+ur1PwvIyeo+j+E5p9vTiOHWdC9hHbxCM5EmsMpQMLxA7i:FVo+jXJzWdC9lXEmGMN3
Score10/10-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-