Snoozegnat.7z
: Once awake, it communicates with a hardcoded IP via HTTPS, disguised as standard telemetry traffic. Behavioral Indicators (IoCs)
: A legitimate, digitally signed executable used for "DLL side-loading." By using a trusted binary, the attacker lowers the suspicion level of the initial process start. SnoozeGnat.7z
: The user is enticed to extract the archive and run the "launcher." : Once awake, it communicates with a hardcoded
: Creation of temporary .tmp files in the %AppData% directory that match the size of your system's ntdll.dll . Conclusion & Mitigation Conclusion & Mitigation : An obfuscated configuration file
: An obfuscated configuration file containing Command & Control (C2) server addresses and sleep timers (hence the name "Snooze"). Execution Chain: How it Works
Information theft and persistent backdoor access. What’s Inside?
Monitor for long-duration "sleep" processes that suddenly initiate external network connections.