General
-
Target
2024-10-10_4bfca9446cb278626b58b350b9e1bc23_poet-rat_snatch
-
Size
7.5MB
-
Sample
241010-lcqktssgne
-
MD5
4bfca9446cb278626b58b350b9e1bc23
-
SHA1
ea4f13440b077c269e283e287ab62109dac1d109
-
SHA256
081634559a7ed65e960a55fd4f1fa40245df7188a33def2f6e1d70f2cafc8c87
-
SHA512
ed4dc98f711b3e1777bad905534489b613516afaf5194801e942104b610622d348cd0d3bff04b80b29e56de52066c2bc0f44a7545985a3a93c6db311ad8cfd36
-
SSDEEP
98304:InKDMH5cGESXimKgrVGEOhMePfxfMGWO76lIQ:ZMH5+KkrfM1O7t
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-10_4bfca9446cb278626b58b350b9e1bc23_poet-rat_snatch.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-10-10_4bfca9446cb278626b58b350b9e1bc23_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://drawwyobstacw.sbs
https://condifendteu.sbs
https://ehticsprocw.sbs
https://vennurviot.sbs
https://resinedyw.sbs
https://enlargkiw.sbs
https://allocatinow.sbs
https://mathcucom.sbs
Extracted
stealc
mainteam
http://95.182.96.50
-
url_path
/2aced82320799c96.php
Targets
-
-
Target
2024-10-10_4bfca9446cb278626b58b350b9e1bc23_poet-rat_snatch
-
Size
7.5MB
-
MD5
4bfca9446cb278626b58b350b9e1bc23
-
SHA1
ea4f13440b077c269e283e287ab62109dac1d109
-
SHA256
081634559a7ed65e960a55fd4f1fa40245df7188a33def2f6e1d70f2cafc8c87
-
SHA512
ed4dc98f711b3e1777bad905534489b613516afaf5194801e942104b610622d348cd0d3bff04b80b29e56de52066c2bc0f44a7545985a3a93c6db311ad8cfd36
-
SSDEEP
98304:InKDMH5cGESXimKgrVGEOhMePfxfMGWO76lIQ:ZMH5+KkrfM1O7t
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3