General
-
Target
2024-07-01_46be1ade3c8d362afda908096f0692c8_eternalromance_poet-rat_snatch
-
Size
7.2MB
-
Sample
240701-le3ceaxbrl
-
MD5
46be1ade3c8d362afda908096f0692c8
-
SHA1
fd0e84380ada5f8ddde393767c9863724b32cedf
-
SHA256
4fec073d12eb85a25c0414f34ddec53451c6727e9b01f6c51bb9fb9325e8ec68
-
SHA512
0a614c183ecdc1fd908729ee66b14df154c6285149f5c57958be6abc217705738235dcd3a2e318df1236762c34f7250dfb7e9a4a0e11a5693966070ed87a0840
-
SSDEEP
98304:KwQRuLhsEDSOfrpqM7os2yZByUrJeR9OYZzgLkiyMnqRLRZXhMG2z0yYP4W7kx5:cRuLhF4lrMqRLR/MdzPYP4b
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-01_46be1ade3c8d362afda908096f0692c8_eternalromance_poet-rat_snatch.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-07-01_46be1ade3c8d362afda908096f0692c8_eternalromance_poet-rat_snatch.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
2024-07-01_46be1ade3c8d362afda908096f0692c8_eternalromance_poet-rat_snatch
-
Size
7.2MB
-
MD5
46be1ade3c8d362afda908096f0692c8
-
SHA1
fd0e84380ada5f8ddde393767c9863724b32cedf
-
SHA256
4fec073d12eb85a25c0414f34ddec53451c6727e9b01f6c51bb9fb9325e8ec68
-
SHA512
0a614c183ecdc1fd908729ee66b14df154c6285149f5c57958be6abc217705738235dcd3a2e318df1236762c34f7250dfb7e9a4a0e11a5693966070ed87a0840
-
SSDEEP
98304:KwQRuLhsEDSOfrpqM7os2yZByUrJeR9OYZzgLkiyMnqRLRZXhMG2z0yYP4W7kx5:cRuLhF4lrMqRLR/MdzPYP4b
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
3