General

  • Target

    2024-09-07_8ab1af9bdf7bd2fb52683a9f0a9fb22b_poet-rat_snatch

  • Size

    9.2MB

  • Sample

    240907-ngn9ns1glp

  • MD5

    8ab1af9bdf7bd2fb52683a9f0a9fb22b

  • SHA1

    558eb72d64b63967a1e7ee5f5aedfea7684b5c2a

  • SHA256

    e72968b00e099abc78ffa34415a284e6df5cf54529e2333277031aac6e061c6b

  • SHA512

    96479ee2374219fc70709385b78cfbd612342735dc0a63bfa48f20551d6397d2d57a63fe08d20da213cccc9ecf6bb14aa446666c9cb8db37a9806dca67f66f0d

  • SSDEEP

    98304:jAepitsWVwUQtDxLq+na0lH/XxMLvhhZytTVhg5iqPzN:jAGitpzQxMLphwVhGzN

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      2024-09-07_8ab1af9bdf7bd2fb52683a9f0a9fb22b_poet-rat_snatch

    • Size

      9.2MB

    • MD5

      8ab1af9bdf7bd2fb52683a9f0a9fb22b

    • SHA1

      558eb72d64b63967a1e7ee5f5aedfea7684b5c2a

    • SHA256

      e72968b00e099abc78ffa34415a284e6df5cf54529e2333277031aac6e061c6b

    • SHA512

      96479ee2374219fc70709385b78cfbd612342735dc0a63bfa48f20551d6397d2d57a63fe08d20da213cccc9ecf6bb14aa446666c9cb8db37a9806dca67f66f0d

    • SSDEEP

      98304:jAepitsWVwUQtDxLq+na0lH/XxMLvhhZytTVhg5iqPzN:jAGitpzQxMLphwVhGzN

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Windows security bypass

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Modifies boot configuration data using bcdedit

MITRE ATT&CK Enterprise v15

Tasks