General
-
Target
2024-08-29_b96cd71256079936fd91f14257b98a10_poet-rat_snatch
-
Size
16.2MB
-
Sample
240829-n5gvhazfnd
-
MD5
b96cd71256079936fd91f14257b98a10
-
SHA1
5a8567f7f0b001d03f1d07dff0ee4ee14dd010ed
-
SHA256
ffadb77310871371825f5025eb38a69348e521df09fa1169e65fb0b38fe377da
-
SHA512
61fc03886763c2a1fbcc2f91d4b818cc07fbeccf2f8abe1bf220eb248e99011d288e42c48b084b908c5ae57b3e90e72e1f4b07fa4914f106020bc176d0572705
-
SSDEEP
98304:/nV1w5RUwrcvomByUQBdmFQ6QnxIIC8LSlHbtLcUl441uzTRgjw/q3I2QscE+9FZ:3M4/In6Q48WB441CTRgjwKQXyPl4hPT
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-29_b96cd71256079936fd91f14257b98a10_poet-rat_snatch.exe
Resource
win7-20240704-en
Malware Config
Extracted
lumma
https://readdyloopyeow.shop/api
https://locatedblsoqp.shop/api
https://traineiwnqo.shop/api
Targets
-
-
Target
2024-08-29_b96cd71256079936fd91f14257b98a10_poet-rat_snatch
-
Size
16.2MB
-
MD5
b96cd71256079936fd91f14257b98a10
-
SHA1
5a8567f7f0b001d03f1d07dff0ee4ee14dd010ed
-
SHA256
ffadb77310871371825f5025eb38a69348e521df09fa1169e65fb0b38fe377da
-
SHA512
61fc03886763c2a1fbcc2f91d4b818cc07fbeccf2f8abe1bf220eb248e99011d288e42c48b084b908c5ae57b3e90e72e1f4b07fa4914f106020bc176d0572705
-
SSDEEP
98304:/nV1w5RUwrcvomByUQBdmFQ6QnxIIC8LSlHbtLcUl441uzTRgjw/q3I2QscE+9FZ:3M4/In6Q48WB441CTRgjwKQXyPl4hPT
-
Suspicious use of SetThreadContext
-