Brief

Summary:

Snatch threat actors conduct ransomware execution and data discovery using batch files (.bat). They leverage Windows tools to enumerate systems on the victim's network, compromise domain accounts, and maintain persistence. The actors delete batch files after execution, modify Windows Registry keys, and disable antivirus programs. They also attempt to disable Safe Mode, use brute force to obtain administrator credentials, and interact with the Windows Registry to gather information, search for running processes, and search for files and folders of interest prior to exfiltration.

This content is restricted.

Highlights content goes here...

This content is restricted.

Cybersecurity and Infrastructure Security Agency

Quick Insight
RADA.AI
RADA.AI
Hello! I'm RADA.AI - Regulatory Analysis and Decision Assistance. Your Intelligent guide for compliance and decision-making. How can i assist you today?
Suggested

Form successfully submitted. One of our GRI rep will contact you shortly

Thanking You!

Enter your Email

Enter your registered username/email id.

Enter your Email

Enter your email id below to signup.
Individual Plan
$125 / month OR $1250 / year
Features
Best for: Researchers, Legal professionals, Academics
Enterprise Plan
Contact for Pricing
Features
Best for: Law Firms, Corporations, Government Bodies