General
-
Target
2024-10-25_408214e2e5474991acddca75350c23df_ngrbot_poet-rat_snatch
-
Size
14.2MB
-
Sample
241025-zcm2lawanm
-
MD5
408214e2e5474991acddca75350c23df
-
SHA1
196aba366c6fefc2f9075a19186b47319cfd5c3a
-
SHA256
854dda4311f184951a17cee9b36f40414c8b19808b96daff7b2139f446851a9a
-
SHA512
171ce4c86cd38cff4403604698207f114b4834b8812de6803d73716fdb83bd72031576f47cb7a89a2203d123f3bc14288c2a229af5be5db3d64c3165fa3e6d8b
-
SSDEEP
196608:7WJafoL/tUoTX4ZXbh1Yf0k7Ma/rkFlgdTaUrPPbdfw:7Wsfm/6bh1lkSFCdTauZo
Behavioral task
behavioral1
Sample
2024-10-25_408214e2e5474991acddca75350c23df_ngrbot_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-25_408214e2e5474991acddca75350c23df_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
skuld
https://ptb.discord.com/api/webhooks/1262304792059969556/fyUPRB5FdDVKkteeBILMdxxwDztQAiGbPM8LGLyvygZZy-OC8qRpJvw9ZEofIWBHqRjM
Targets
-
-
Target
2024-10-25_408214e2e5474991acddca75350c23df_ngrbot_poet-rat_snatch
-
Size
14.2MB
-
MD5
408214e2e5474991acddca75350c23df
-
SHA1
196aba366c6fefc2f9075a19186b47319cfd5c3a
-
SHA256
854dda4311f184951a17cee9b36f40414c8b19808b96daff7b2139f446851a9a
-
SHA512
171ce4c86cd38cff4403604698207f114b4834b8812de6803d73716fdb83bd72031576f47cb7a89a2203d123f3bc14288c2a229af5be5db3d64c3165fa3e6d8b
-
SSDEEP
196608:7WJafoL/tUoTX4ZXbh1Yf0k7Ma/rkFlgdTaUrPPbdfw:7Wsfm/6bh1lkSFCdTauZo
Score10/10-
Skuld family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-