General
-
Target
2024-09-25_c8ececb7cd83b938712e63f9e96e6f6c_espilon-red_snatch
-
Size
2.6MB
-
Sample
240925-b2xqbszfle
-
MD5
c8ececb7cd83b938712e63f9e96e6f6c
-
SHA1
942597cd5e7b61721dc516793e7510580757c587
-
SHA256
96b3bcce3280a16131ef6de01f65bdc69314a7d86477321e8bb944d2fb6ff603
-
SHA512
ca9f3d13ae0c043d87ca3ab505c12dec2656ef71c05737f24a3483f9d3619cb9837a36faf71b614b77169e3486057228ba2a4e3920385cabe830033a2395a9f9
-
SSDEEP
24576:LbA9MGiVwmIPOaq6EUWOk/vNKj1xzb6gPvsFjG4/owGkE1Pj:yriVNI2aq6EUdkHNKjTGckowGkE1
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-25_c8ececb7cd83b938712e63f9e96e6f6c_espilon-red_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-25_c8ececb7cd83b938712e63f9e96e6f6c_espilon-red_snatch.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\temp\important.txt
3PztoCUcREzAhVhTwKT1hf2ManFP3eQQJC
Targets
-
-
Target
2024-09-25_c8ececb7cd83b938712e63f9e96e6f6c_espilon-red_snatch
-
Size
2.6MB
-
MD5
c8ececb7cd83b938712e63f9e96e6f6c
-
SHA1
942597cd5e7b61721dc516793e7510580757c587
-
SHA256
96b3bcce3280a16131ef6de01f65bdc69314a7d86477321e8bb944d2fb6ff603
-
SHA512
ca9f3d13ae0c043d87ca3ab505c12dec2656ef71c05737f24a3483f9d3619cb9837a36faf71b614b77169e3486057228ba2a4e3920385cabe830033a2395a9f9
-
SSDEEP
24576:LbA9MGiVwmIPOaq6EUWOk/vNKj1xzb6gPvsFjG4/owGkE1Pj:yriVNI2aq6EUdkHNKjTGckowGkE1
Score10/10-
Modifies WinLogon for persistence
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1