General
-
Target
2024-09-26_bbc984e453abf2fe658869b284a52dbf_poet-rat_snatch
-
Size
8.3MB
-
Sample
240926-prw8psxcpj
-
MD5
bbc984e453abf2fe658869b284a52dbf
-
SHA1
67efe0a521434db39b9cc93c714f126d3691a8a3
-
SHA256
74439b64c299dca464dbc4557a4821225567dd301e32c7c367f31c0858e4a7be
-
SHA512
0d39e250e3fe12a8c69b98ffa55935a2b215d08997aa2205408ded8c572a2293829b497658e5b3af9ec70aad88edd04e209359abee6afd71d15f018ce555a170
-
SSDEEP
98304:0kIhs4Oy515t3t/lsWbb0HEY8b/1qhZytTD5iq:0kws4RlzPwOshwN
Behavioral task
behavioral1
Sample
2024-09-26_bbc984e453abf2fe658869b284a52dbf_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-26_bbc984e453abf2fe658869b284a52dbf_poet-rat_snatch.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-09-26_bbc984e453abf2fe658869b284a52dbf_poet-rat_snatch
-
Size
8.3MB
-
MD5
bbc984e453abf2fe658869b284a52dbf
-
SHA1
67efe0a521434db39b9cc93c714f126d3691a8a3
-
SHA256
74439b64c299dca464dbc4557a4821225567dd301e32c7c367f31c0858e4a7be
-
SHA512
0d39e250e3fe12a8c69b98ffa55935a2b215d08997aa2205408ded8c572a2293829b497658e5b3af9ec70aad88edd04e209359abee6afd71d15f018ce555a170
-
SSDEEP
98304:0kIhs4Oy515t3t/lsWbb0HEY8b/1qhZytTD5iq:0kws4RlzPwOshwN
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1