Analysis

  • max time kernel
    93s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 01:50

General

  • Target

    2025-01-11_c68062020f8db3200c7c2a718ffebed7_snatch.exe

  • Size

    3.3MB

  • MD5

    c68062020f8db3200c7c2a718ffebed7

  • SHA1

    8b29cca6d56f9a764c1d2ced8fd272ef15a198af

  • SHA256

    75d1ed2b9736dd1e79efa4b4ecb3fec27acd0b9ab31ef23d226ed4021c58e3e1

  • SHA512

    0596487fab10eb1c4e7a4c0941879f76af9b62e696071db0f9ff85103df6ef0f0c14c422277916142995e7fa9fb208212b3464025bcd24149ce318da1944e83b

  • SSDEEP

    98304:tVd6ZLw+J87yPXH1U5vYA7RzZfedcD3OdxgDTU2:jduJlXSX/5D3Xv

Malware Config

Signatures

  • An open source browser data exporter written in golang. 1 IoCs
  • HackBrowserData

    An open source golang web browser extractor.

  • Hackbrowserdata family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-11_c68062020f8db3200c7c2a718ffebed7_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-11_c68062020f8db3200c7c2a718ffebed7_snatch.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Local Storage\leveldb_7.temp\MANIFEST-000001

    Filesize

    41B

    MD5

    5af87dfd673ba2115e2fcf5cfdb727ab

    SHA1

    d5b5bbf396dc291274584ef71f444f420b6056f1

    SHA256

    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

    SHA512

    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

  • C:\Users\Admin\AppData\Local\Temp\Session Storage_8.temp\CURRENT.bak

    Filesize

    16B

    MD5

    46295cac801e5d4857d09837238a6394

    SHA1

    44e0fa1b517dbf802b18faf0785eeea6ac51594b

    SHA256

    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

    SHA512

    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

  • memory/2124-0-0x0000000000E70000-0x0000000001780000-memory.dmp

    Filesize

    9.1MB

  • memory/2124-148-0x0000000000E70000-0x0000000001780000-memory.dmp

    Filesize

    9.1MB