General
-
Target
2024-06-27_73c265ce417e5a4d23c841f2c02d5956_ngrbot_poet-rat_sliver_snatch
-
Size
9.5MB
-
Sample
240627-gqvdqaybjn
-
MD5
73c265ce417e5a4d23c841f2c02d5956
-
SHA1
902c82c28a7f09f42d14c69bc0c50e17f037698b
-
SHA256
cc208b61c6aa312b4d2321f0397423c9b19a271f3b0753a8d0c2e020c73d10ca
-
SHA512
6d4beac332adc5f8df96aa2fb99c106e1cc1ee24a003b19305de9ffec0077ed7c0d539742662016f5f804fd9cadfa108c5e2e90e1bc04b5edd52714f7330d045
-
SSDEEP
98304:pdAPrGpha6grLZ4tJS6NQSBEgR8SF8k2nV3S:EzGphk4tJSIQHuXuV3S
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-27_73c265ce417e5a4d23c841f2c02d5956_ngrbot_poet-rat_sliver_snatch.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-27_73c265ce417e5a4d23c841f2c02d5956_ngrbot_poet-rat_sliver_snatch.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
skuld
https://ptb.discord.com/api/webhooks/1252696978039636130/g9z0GlomdTtoSV1VeuxuDXCQsAVQeamKh882rI82-5MDpkkCU0uWJpi6P8B7E9BYLsUu
Targets
-
-
Target
2024-06-27_73c265ce417e5a4d23c841f2c02d5956_ngrbot_poet-rat_sliver_snatch
-
Size
9.5MB
-
MD5
73c265ce417e5a4d23c841f2c02d5956
-
SHA1
902c82c28a7f09f42d14c69bc0c50e17f037698b
-
SHA256
cc208b61c6aa312b4d2321f0397423c9b19a271f3b0753a8d0c2e020c73d10ca
-
SHA512
6d4beac332adc5f8df96aa2fb99c106e1cc1ee24a003b19305de9ffec0077ed7c0d539742662016f5f804fd9cadfa108c5e2e90e1bc04b5edd52714f7330d045
-
SSDEEP
98304:pdAPrGpha6grLZ4tJS6NQSBEgR8SF8k2nV3S:EzGphk4tJSIQHuXuV3S
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1