General
-
Target
2024-09-30_2f94073eec9b3fa92bc9106dfec67a46_ngrbot_poet-rat_snatch
-
Size
14.8MB
-
Sample
240930-lrdvksshjd
-
MD5
2f94073eec9b3fa92bc9106dfec67a46
-
SHA1
1c9e9faabafc8c600e79b9682fb8647d933e7249
-
SHA256
a36e4f998a9fd480064c002feae5a290bec8f8c84d9f4b8827e94d12ad3cba25
-
SHA512
6b66e03377a13a52683951f9609dd20d19096d79fd24342f939733692f6b3e5e44bf522d0c32d4d9da68fea33a603a5a811244bfa3a6ca6c3055a69af24c76bd
-
SSDEEP
196608:zpOO+VK+RY9CnIpElJEMj5zmM0l+KPbZUtxhoVsSygLw:zGVmqJCEaYxhoxLL
Behavioral task
behavioral1
Sample
2024-09-30_2f94073eec9b3fa92bc9106dfec67a46_ngrbot_poet-rat_snatch.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-30_2f94073eec9b3fa92bc9106dfec67a46_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1288095409499148358/f-XnFnAZO39iuEqRQm03JW8tZv95XhynsrZJnx1Rut0s7n5ljiYv_kuZc6xMoyux-Ol9
Targets
-
-
Target
2024-09-30_2f94073eec9b3fa92bc9106dfec67a46_ngrbot_poet-rat_snatch
-
Size
14.8MB
-
MD5
2f94073eec9b3fa92bc9106dfec67a46
-
SHA1
1c9e9faabafc8c600e79b9682fb8647d933e7249
-
SHA256
a36e4f998a9fd480064c002feae5a290bec8f8c84d9f4b8827e94d12ad3cba25
-
SHA512
6b66e03377a13a52683951f9609dd20d19096d79fd24342f939733692f6b3e5e44bf522d0c32d4d9da68fea33a603a5a811244bfa3a6ca6c3055a69af24c76bd
-
SSDEEP
196608:zpOO+VK+RY9CnIpElJEMj5zmM0l+KPbZUtxhoVsSygLw:zGVmqJCEaYxhoxLL
Score10/10-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-