General
-
Target
2024-10-10_ef73612f46c61d7042f63d9818879d0f_poet-rat_snatch
-
Size
7.5MB
-
Sample
241010-mez3qatekd
-
MD5
ef73612f46c61d7042f63d9818879d0f
-
SHA1
0801aac8254f2ec234f4fb6e181d60ae39fd1021
-
SHA256
b59de93972a43adb45d38fb3df5cf87735dccaac41a351cdfc09e3660642486c
-
SHA512
30ff2583a13103bf00e412dd543181fe709eea2037cbd385fae2096962e43406264491302e1f37b7a4a74c3739436046201f0a3162fa3c502305869f47b7bb9d
-
SSDEEP
98304:oNF2OZV+MaTsEPLMmRwjNn/Wi9l5VrAZrwE3Io:onV+MW+NPzrA9
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-10_ef73612f46c61d7042f63d9818879d0f_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-10_ef73612f46c61d7042f63d9818879d0f_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://drawwyobstacw.sbs
https://condifendteu.sbs
https://ehticsprocw.sbs
https://vennurviot.sbs
https://resinedyw.sbs
https://enlargkiw.sbs
https://allocatinow.sbs
https://mathcucom.sbs
Extracted
stealc
mainteam
http://95.182.96.50
-
url_path
/2aced82320799c96.php
Targets
-
-
Target
2024-10-10_ef73612f46c61d7042f63d9818879d0f_poet-rat_snatch
-
Size
7.5MB
-
MD5
ef73612f46c61d7042f63d9818879d0f
-
SHA1
0801aac8254f2ec234f4fb6e181d60ae39fd1021
-
SHA256
b59de93972a43adb45d38fb3df5cf87735dccaac41a351cdfc09e3660642486c
-
SHA512
30ff2583a13103bf00e412dd543181fe709eea2037cbd385fae2096962e43406264491302e1f37b7a4a74c3739436046201f0a3162fa3c502305869f47b7bb9d
-
SSDEEP
98304:oNF2OZV+MaTsEPLMmRwjNn/Wi9l5VrAZrwE3Io:onV+MW+NPzrA9
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3