Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 01:02

General

  • Target

    2024-10-09_00b199a4158e5ea844cd5d606745c3f7_poet-rat_snatch.exe

  • Size

    7.0MB

  • MD5

    00b199a4158e5ea844cd5d606745c3f7

  • SHA1

    bc47c65922b2cedc17933392f414f76339534932

  • SHA256

    fe6125774d586c4547e08bcf7f8ca5aff37b2ef7b4113c79dc130426bccd7627

  • SHA512

    6cda73200f907ea78f8c57accc14d38cfe85d44c1b822667b1259f09a52a8f7d767b1e03eafca549c0b46907a8d627adec3ccd5e00cb1c283cd2efc859e5400b

  • SSDEEP

    98304:X3/wqb29XxEgcZafxdF1DtQuofSJvKaDh1fpuBLPs:ne9iPafXF/QnaRKaDhnu

Score
9/10

Malware Config

Signatures

  • Contacts a large (18580) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-09_00b199a4158e5ea844cd5d606745c3f7_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-09_00b199a4158e5ea844cd5d606745c3f7_poet-rat_snatch.exe"
    1⤵
    • Modifies system certificate store
    PID:3556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads