General
-
Target
2024-10-10_da1163cbe0fe34235be01b2779bd47dd_ngrbot_poet-rat_snatch
-
Size
9.9MB
-
Sample
241010-jfrk7axapl
-
MD5
da1163cbe0fe34235be01b2779bd47dd
-
SHA1
b882dfb3a0b6bb414a74a730452de2b249b34902
-
SHA256
e1aa7ffbe0f7ffe2f2dc5c333d11abbc9792b2e9a4ae8efe7bcaf59ebacd07bf
-
SHA512
a7bab9a4973a85f6746f027dc68403a636f25130be5e8f84189fb1572fcabfa1360e46a7f5b0d8e17279bf514640c14318e1e368f4fe96f882804ff661cbb267
-
SSDEEP
98304:BQI9wzKxmhMIIKfGTibiyCC9cK8PE2ICafZmwjsEejd:BIzKxmhhtbiyCicRMDUjd
Behavioral task
behavioral1
Sample
2024-10-10_da1163cbe0fe34235be01b2779bd47dd_ngrbot_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-10_da1163cbe0fe34235be01b2779bd47dd_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1291908107860971603/XGoLiS9wjdOSFj4pjcQ4AlMbEqPh-HmGBBMnGcZWKXmuIlY9DVShx0Z80Hqcyi9lLhIv
Targets
-
-
Target
2024-10-10_da1163cbe0fe34235be01b2779bd47dd_ngrbot_poet-rat_snatch
-
Size
9.9MB
-
MD5
da1163cbe0fe34235be01b2779bd47dd
-
SHA1
b882dfb3a0b6bb414a74a730452de2b249b34902
-
SHA256
e1aa7ffbe0f7ffe2f2dc5c333d11abbc9792b2e9a4ae8efe7bcaf59ebacd07bf
-
SHA512
a7bab9a4973a85f6746f027dc68403a636f25130be5e8f84189fb1572fcabfa1360e46a7f5b0d8e17279bf514640c14318e1e368f4fe96f882804ff661cbb267
-
SSDEEP
98304:BQI9wzKxmhMIIKfGTibiyCC9cK8PE2ICafZmwjsEejd:BIzKxmhhtbiyCicRMDUjd
Score10/10-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-