General
-
Target
2024-10-10_71885d64a99f852752f10a610d6323f8_poet-rat_snatch
-
Size
7.5MB
-
Sample
241010-bmqngatble
-
MD5
71885d64a99f852752f10a610d6323f8
-
SHA1
3fd47f10f4b3aaafa78be32c7acc1607a8eedf0b
-
SHA256
47eadd0c65fedb7357abe72ab7f69a3fe50f409cecda40008e3b267df069f2f0
-
SHA512
6de24fcabbe7a9329de3703dc689b587a9622a72d3be803bd169295968da6e950eb11f9fdeadf330239473fd85b3d7d2cb16fe313b40d338dde9bc4a70cf7bd1
-
SSDEEP
98304:STjTJ+nOLBEt7imKJk/aNZSVFRMIIHgZa4x:Sl+nO+dIYFRMzAZ
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-10_71885d64a99f852752f10a610d6323f8_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-10_71885d64a99f852752f10a610d6323f8_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://drawwyobstacw.sbs
https://condifendteu.sbs
https://ehticsprocw.sbs
https://vennurviot.sbs
https://resinedyw.sbs
https://enlargkiw.sbs
https://allocatinow.sbs
https://mathcucom.sbs
Extracted
stealc
mainteam
http://95.182.96.50
-
url_path
/2aced82320799c96.php
Targets
-
-
Target
2024-10-10_71885d64a99f852752f10a610d6323f8_poet-rat_snatch
-
Size
7.5MB
-
MD5
71885d64a99f852752f10a610d6323f8
-
SHA1
3fd47f10f4b3aaafa78be32c7acc1607a8eedf0b
-
SHA256
47eadd0c65fedb7357abe72ab7f69a3fe50f409cecda40008e3b267df069f2f0
-
SHA512
6de24fcabbe7a9329de3703dc689b587a9622a72d3be803bd169295968da6e950eb11f9fdeadf330239473fd85b3d7d2cb16fe313b40d338dde9bc4a70cf7bd1
-
SSDEEP
98304:STjTJ+nOLBEt7imKJk/aNZSVFRMIIHgZa4x:Sl+nO+dIYFRMzAZ
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3