General
-
Target
2024-09-25_10d14b6197eeedf0f166d0a4fa2659a9_ngrbot_poet-rat_snatch
-
Size
9.9MB
-
Sample
240925-nws66swhpe
-
MD5
10d14b6197eeedf0f166d0a4fa2659a9
-
SHA1
25bd554729a5719957e91b251a1eaee3e2221d79
-
SHA256
575eb29192f0a9c804615c06ead3536f4918f47e7c0f37e26f803764c1e88280
-
SHA512
f4ae7be5906019f1ceadf80d57c5784b595d3f52f36c763e7866e996c741cbfb963933840b44b1d51f1e1ee621419ac5473d85dd0999a6f1125136315da7ed9d
-
SSDEEP
98304:LsvhF/1BWaUgkNP9OT3bbIU+mXIhExICafZmyjsEtjG:LU/1BWama3bbILmYiQdjG
Behavioral task
behavioral1
Sample
2024-09-25_10d14b6197eeedf0f166d0a4fa2659a9_ngrbot_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-25_10d14b6197eeedf0f166d0a4fa2659a9_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1275560943589523539/BJK9iC8Svr2Fre-qgTymdqr9WpjvwwbYpYjpS2i15nqdELMnGFAQH7BhyHNCVncljHvH
Targets
-
-
Target
2024-09-25_10d14b6197eeedf0f166d0a4fa2659a9_ngrbot_poet-rat_snatch
-
Size
9.9MB
-
MD5
10d14b6197eeedf0f166d0a4fa2659a9
-
SHA1
25bd554729a5719957e91b251a1eaee3e2221d79
-
SHA256
575eb29192f0a9c804615c06ead3536f4918f47e7c0f37e26f803764c1e88280
-
SHA512
f4ae7be5906019f1ceadf80d57c5784b595d3f52f36c763e7866e996c741cbfb963933840b44b1d51f1e1ee621419ac5473d85dd0999a6f1125136315da7ed9d
-
SSDEEP
98304:LsvhF/1BWaUgkNP9OT3bbIU+mXIhExICafZmyjsEtjG:LU/1BWama3bbILmYiQdjG
Score10/10-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-