General
-
Target
2024-11-01_40d018859295feb0f4c867e419a58472_ngrbot_poet-rat_snatch
-
Size
9.9MB
-
Sample
241101-jm7wrayfnm
-
MD5
40d018859295feb0f4c867e419a58472
-
SHA1
4c103801d169f4f95ec5c813b6d69bd7ef0ad6c9
-
SHA256
6d3c84d200a51ce6c2c3053d3bf342eeaf4992b8d724ecf85322631c5aacad42
-
SHA512
5b443e7c6c52379fae97332ead31b7309d9235c0040c8c3e470d2aff2c74d293fe2b4ea8c2b1029a49be1f799f301621633ba6772b012792c4a10c1d747c1fec
-
SSDEEP
98304:HzU4brhxBASgf/gEpiji6Ig8TWAHEIICafZm/mbnXg:HxrhxBAGZji6IdThkRTXg
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-01_40d018859295feb0f4c867e419a58472_ngrbot_poet-rat_snatch.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-11-01_40d018859295feb0f4c867e419a58472_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1300640883045044255/aFrsgT4Hwvi5URGm-lEhgc9sy1_1X-75AzV0K_V3HctOWry8Qx_y0WQAxJwPkz3zdQ9t
Targets
-
-
Target
2024-11-01_40d018859295feb0f4c867e419a58472_ngrbot_poet-rat_snatch
-
Size
9.9MB
-
MD5
40d018859295feb0f4c867e419a58472
-
SHA1
4c103801d169f4f95ec5c813b6d69bd7ef0ad6c9
-
SHA256
6d3c84d200a51ce6c2c3053d3bf342eeaf4992b8d724ecf85322631c5aacad42
-
SHA512
5b443e7c6c52379fae97332ead31b7309d9235c0040c8c3e470d2aff2c74d293fe2b4ea8c2b1029a49be1f799f301621633ba6772b012792c4a10c1d747c1fec
-
SSDEEP
98304:HzU4brhxBASgf/gEpiji6Ig8TWAHEIICafZm/mbnXg:HxrhxBAGZji6IdThkRTXg
Score10/10-
Skuld family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-