General

  • Target

    2024-09-13_c097e06be926f7496a7c58896b9692a4_hijackloader_poet-rat_snatch

  • Size

    8.1MB

  • Sample

    240913-qqta4asdmk

  • MD5

    c097e06be926f7496a7c58896b9692a4

  • SHA1

    8efebbfced6fd53f9d0f3850408bbdbf88c23d2b

  • SHA256

    b5d0b945169391a9d4df8fa698472e0a7a6a51a25ac4f583db4e5b96e52c78cc

  • SHA512

    c4ce0633aab7c017ab61d85e6e2837530bf8834ddcad5f9fdd4ecaaf20c8b2553fe08be416c460d5c746810e50b829f9bafbd46e26ab4179530458d224c40baf

  • SSDEEP

    98304:PsMhTgTfuJENBHvu4PxMCURCAgTs7UHloh6K7jMy3MPm:kMxMuobUUI7Uw6KXMyY

Malware Config

Targets

    • Target

      2024-09-13_c097e06be926f7496a7c58896b9692a4_hijackloader_poet-rat_snatch

    • Size

      8.1MB

    • MD5

      c097e06be926f7496a7c58896b9692a4

    • SHA1

      8efebbfced6fd53f9d0f3850408bbdbf88c23d2b

    • SHA256

      b5d0b945169391a9d4df8fa698472e0a7a6a51a25ac4f583db4e5b96e52c78cc

    • SHA512

      c4ce0633aab7c017ab61d85e6e2837530bf8834ddcad5f9fdd4ecaaf20c8b2553fe08be416c460d5c746810e50b829f9bafbd46e26ab4179530458d224c40baf

    • SSDEEP

      98304:PsMhTgTfuJENBHvu4PxMCURCAgTs7UHloh6K7jMy3MPm:kMxMuobUUI7Uw6KXMyY

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks