Snoozegnat.7z -
: A legitimate, digitally signed executable used for "DLL side-loading." By using a trusted binary, the attacker lowers the suspicion level of the initial process start.
If you are monitoring a network, look for these specific red flags: SnoozeGnat.7z
: An obfuscated configuration file containing Command & Control (C2) server addresses and sleep timers (hence the name "Snooze"). Execution Chain: How it Works : A legitimate, digitally signed executable used for
In the world of threat hunting, the most unassuming file names often hide the most sophisticated payloads. Today, we’re cracking open , an archive that has recently surfaced in several sandbox environments. This post explores the contents, execution flow, and potential indicators of compromise (IoCs) associated with this package. Overview of the Archive Today, we’re cracking open , an archive that
Implement that flags DLL side-loading from non-standard paths.
Drop a comment below or reach out to our SOC team for the full YARA rule set.