Snoozegnat.7z
In the world of threat hunting, the most unassuming file names often hide the most sophisticated payloads. Today, we’re cracking open , an archive that has recently surfaced in several sandbox environments. This post explores the contents, execution flow, and potential indicators of compromise (IoCs) associated with this package. Overview of the Archive
If you are monitoring a network, look for these specific red flags: SnoozeGnat.7z
Implement that flags DLL side-loading from non-standard paths. In the world of threat hunting, the most
: The legitimate launcher looks for its required library. Because gnat_api.dll is in the same folder, it loads the malicious version instead of the system version. Overview of the Archive If you are monitoring
Drop a comment below or reach out to our SOC team for the full YARA rule set.
: The malicious payload. This is the heart of the SnoozeGnat operation. When the launcher runs, it automatically calls this DLL, which contains the encrypted malware logic.