General
-
Target
2024-10-15_ab36761933c5bb4881dac471eda52d2a_ngrbot_poet-rat_snatch
-
Size
9.9MB
-
Sample
241015-jdh62ascjh
-
MD5
ab36761933c5bb4881dac471eda52d2a
-
SHA1
5564d033cfe34b44780f38729990e574b14096e6
-
SHA256
f2b5a3386be42bcfcd51a8b315fa95d68cb5b04cd50d2c011a21c798ab1c006d
-
SHA512
9369dcbec8299c518859f9bcfee17b0147163694cc057aaf703bea66a20da532e11b8f1ffefb7941f49f24376e1f0b645196a81c0bb6eb8ad592a8486625fc58
-
SSDEEP
98304:NQI9wzKxmhMIIKfGTibiyCC9cK8hE2ICafZmwjsEejd:NIzKxmhhtbiyCicRiDUjd
Behavioral task
behavioral1
Sample
2024-10-15_ab36761933c5bb4881dac471eda52d2a_ngrbot_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-15_ab36761933c5bb4881dac471eda52d2a_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1294012555202920559/v8mpSIGHpZ2qpSNY0MXMTLt2V1s8OtvSeD02GxPWxCTt4Ijw0ZCVGaZ-FlxzORFqdZ_Z
Targets
-
-
Target
2024-10-15_ab36761933c5bb4881dac471eda52d2a_ngrbot_poet-rat_snatch
-
Size
9.9MB
-
MD5
ab36761933c5bb4881dac471eda52d2a
-
SHA1
5564d033cfe34b44780f38729990e574b14096e6
-
SHA256
f2b5a3386be42bcfcd51a8b315fa95d68cb5b04cd50d2c011a21c798ab1c006d
-
SHA512
9369dcbec8299c518859f9bcfee17b0147163694cc057aaf703bea66a20da532e11b8f1ffefb7941f49f24376e1f0b645196a81c0bb6eb8ad592a8486625fc58
-
SSDEEP
98304:NQI9wzKxmhMIIKfGTibiyCC9cK8hE2ICafZmwjsEejd:NIzKxmhhtbiyCicRiDUjd
Score10/10-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-