General
-
Target
2024-10-03_32004b237b6bad18f9edc16039081f1a_ngrbot_poet-rat_snatch
-
Size
9.5MB
-
Sample
241003-g55s1aygjq
-
MD5
32004b237b6bad18f9edc16039081f1a
-
SHA1
8e6215dade663965c583779f3acc8dbb67456a6d
-
SHA256
f304fb338cc0e7e46a78ac6d640ef4635b4203ebed1b7483cebe7c8cc5dbeedf
-
SHA512
b3c167580572bc66e2998c3b81d2dea032dfe9c757846f3571b13b5142e9a78f58941abc068bd060f6dce49dfdb4fbdf0572e78b50bae58a4551b3d6b6eddef3
-
SSDEEP
98304:MLNkPQbfzcsr+zUxkol+6VHMkLE/BD7F/Bz2zIb:MOSfzHkol+MHMkY/BPQIb
Behavioral task
behavioral1
Sample
2024-10-03_32004b237b6bad18f9edc16039081f1a_ngrbot_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-03_32004b237b6bad18f9edc16039081f1a_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1264923593335115866/R9L2dRxVWQnFZIaDPByNflHe9wGrOMoCwe6YYof1SnPTktbvuCwlgZqUp2313y7NvLgB
Targets
-
-
Target
2024-10-03_32004b237b6bad18f9edc16039081f1a_ngrbot_poet-rat_snatch
-
Size
9.5MB
-
MD5
32004b237b6bad18f9edc16039081f1a
-
SHA1
8e6215dade663965c583779f3acc8dbb67456a6d
-
SHA256
f304fb338cc0e7e46a78ac6d640ef4635b4203ebed1b7483cebe7c8cc5dbeedf
-
SHA512
b3c167580572bc66e2998c3b81d2dea032dfe9c757846f3571b13b5142e9a78f58941abc068bd060f6dce49dfdb4fbdf0572e78b50bae58a4551b3d6b6eddef3
-
SSDEEP
98304:MLNkPQbfzcsr+zUxkol+6VHMkLE/BD7F/Bz2zIb:MOSfzHkol+MHMkY/BPQIb
Score10/10-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-