General
-
Target
2024-09-13_c097e06be926f7496a7c58896b9692a4_hijackloader_poet-rat_snatch
-
Size
8.1MB
-
Sample
240913-qqta4asdmk
-
MD5
c097e06be926f7496a7c58896b9692a4
-
SHA1
8efebbfced6fd53f9d0f3850408bbdbf88c23d2b
-
SHA256
b5d0b945169391a9d4df8fa698472e0a7a6a51a25ac4f583db4e5b96e52c78cc
-
SHA512
c4ce0633aab7c017ab61d85e6e2837530bf8834ddcad5f9fdd4ecaaf20c8b2553fe08be416c460d5c746810e50b829f9bafbd46e26ab4179530458d224c40baf
-
SSDEEP
98304:PsMhTgTfuJENBHvu4PxMCURCAgTs7UHloh6K7jMy3MPm:kMxMuobUUI7Uw6KXMyY
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_c097e06be926f7496a7c58896b9692a4_hijackloader_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-13_c097e06be926f7496a7c58896b9692a4_hijackloader_poet-rat_snatch.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-09-13_c097e06be926f7496a7c58896b9692a4_hijackloader_poet-rat_snatch
-
Size
8.1MB
-
MD5
c097e06be926f7496a7c58896b9692a4
-
SHA1
8efebbfced6fd53f9d0f3850408bbdbf88c23d2b
-
SHA256
b5d0b945169391a9d4df8fa698472e0a7a6a51a25ac4f583db4e5b96e52c78cc
-
SHA512
c4ce0633aab7c017ab61d85e6e2837530bf8834ddcad5f9fdd4ecaaf20c8b2553fe08be416c460d5c746810e50b829f9bafbd46e26ab4179530458d224c40baf
-
SSDEEP
98304:PsMhTgTfuJENBHvu4PxMCURCAgTs7UHloh6K7jMy3MPm:kMxMuobUUI7Uw6KXMyY
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1