General
-
Target
2024-07-06_15767d56c12becc21502a59355a9c163_ngrbot_poet-rat_snatch
-
Size
9.5MB
-
Sample
240706-wess3sxelk
-
MD5
15767d56c12becc21502a59355a9c163
-
SHA1
360524f903a06307f32a9fd8ca839da949c75916
-
SHA256
7cb04b7c094f2f1beb40a7b27136a9ff9c954b3edda52f5de99b31635e50b6db
-
SHA512
e7faa7034920ed376869548fe2107035d7c24c578961fa2a1317f5f2231b2333668fd475a3b2deaf99fc4e87894f59837d40950f67cdadb4b1b016d0761dc13a
-
SSDEEP
98304:NzZIWZX0gybHFmOKMW2S6by4ELW/6FQKVVSf:n3501sMW2SiyxqEVVSf
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-06_15767d56c12becc21502a59355a9c163_ngrbot_poet-rat_snatch.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-06_15767d56c12becc21502a59355a9c163_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1258496423444615342/CgJY-4xdm5Ye24oauoByyHTOC86vzjGJvv8cMxKQz03UpkK8RVz4-rL3_dhMIWWysqJ_
Targets
-
-
Target
2024-07-06_15767d56c12becc21502a59355a9c163_ngrbot_poet-rat_snatch
-
Size
9.5MB
-
MD5
15767d56c12becc21502a59355a9c163
-
SHA1
360524f903a06307f32a9fd8ca839da949c75916
-
SHA256
7cb04b7c094f2f1beb40a7b27136a9ff9c954b3edda52f5de99b31635e50b6db
-
SHA512
e7faa7034920ed376869548fe2107035d7c24c578961fa2a1317f5f2231b2333668fd475a3b2deaf99fc4e87894f59837d40950f67cdadb4b1b016d0761dc13a
-
SSDEEP
98304:NzZIWZX0gybHFmOKMW2S6by4ELW/6FQKVVSf:n3501sMW2SiyxqEVVSf
-
Drops file in Drivers directory
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1