General

  • Target

    2024-08-17_0e275e10d98d838332ad0fd726b06420_poet-rat_snatch

  • Size

    7.7MB

  • Sample

    240817-eazx6aydkm

  • MD5

    0e275e10d98d838332ad0fd726b06420

  • SHA1

    be09a452f9b971d6732f8b268971f10dde4f57fc

  • SHA256

    aabbf9a7992565949206be325ddae632b6ed6a7e2376a4a3c35f4631cbe7326d

  • SHA512

    ea874919fb559535338a87936a26ccba9f92b3191456c3f91f0d4b35b8ed64d9a99a6c968110bd26749db36cb2a4a496ac4a9dbb063376b4dd2895d8cec8ddb5

  • SSDEEP

    98304:gX960BV8Bfv1EGgoevqoeIf8UXk8ZAWXBJxnZxEskO1bONC+9:WBV8B2G0veIFXkqvXB/ZxV8NC+

Malware Config

Targets

    • Target

      2024-08-17_0e275e10d98d838332ad0fd726b06420_poet-rat_snatch

    • Size

      7.7MB

    • MD5

      0e275e10d98d838332ad0fd726b06420

    • SHA1

      be09a452f9b971d6732f8b268971f10dde4f57fc

    • SHA256

      aabbf9a7992565949206be325ddae632b6ed6a7e2376a4a3c35f4631cbe7326d

    • SHA512

      ea874919fb559535338a87936a26ccba9f92b3191456c3f91f0d4b35b8ed64d9a99a6c968110bd26749db36cb2a4a496ac4a9dbb063376b4dd2895d8cec8ddb5

    • SSDEEP

      98304:gX960BV8Bfv1EGgoevqoeIf8UXk8ZAWXBJxnZxEskO1bONC+9:WBV8B2G0veIFXkqvXB/ZxV8NC+

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks