General
-
Target
2024-11-10_e167b32977bb2379e4d35f8586f90dc8_frostygoop_poet-rat_snatch
-
Size
4.9MB
-
Sample
241110-bdlyxswdra
-
MD5
e167b32977bb2379e4d35f8586f90dc8
-
SHA1
7f58ddb47afc629c729d45d7a623307b8f7353ad
-
SHA256
9e2610031ebad347e05c91746f4a50fa3211bcd433c5d2605ea4903be5fc4951
-
SHA512
9d0294d75bfa09e366edc8808a50f8420ac098947df83146f50660a1b6e9b38ad56bba119cc3ae54cc3078323802189633bf3fc54f006706f0ee155207100946
-
SSDEEP
49152:6ztyl6vJ2raXerXv/oV/5EKKyVzpMmd6CAzHXFOp+MdawAb8cOWthHMQRWzQfQ09:4yafav/lrzHEpib8dWbC8L8+
Behavioral task
behavioral1
Sample
2024-11-10_e167b32977bb2379e4d35f8586f90dc8_frostygoop_poet-rat_snatch.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-11-10_e167b32977bb2379e4d35f8586f90dc8_frostygoop_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
2.9
f2a0fa19d8959a4621bac92c4a6959ed
https://t.me/nemesisgrow
https://steamcommunity.com/profiles/76561199471222742
http://65.109.12.165:80
-
profile_id_v2
f2a0fa19d8959a4621bac92c4a6959ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.1.2 Safari/605.1.15
Extracted
redline
1
176.113.115.220:80
-
auth_value
b6c86adb7106e9ee7247628f59e06830
Targets
-
-
Target
2024-11-10_e167b32977bb2379e4d35f8586f90dc8_frostygoop_poet-rat_snatch
-
Size
4.9MB
-
MD5
e167b32977bb2379e4d35f8586f90dc8
-
SHA1
7f58ddb47afc629c729d45d7a623307b8f7353ad
-
SHA256
9e2610031ebad347e05c91746f4a50fa3211bcd433c5d2605ea4903be5fc4951
-
SHA512
9d0294d75bfa09e366edc8808a50f8420ac098947df83146f50660a1b6e9b38ad56bba119cc3ae54cc3078323802189633bf3fc54f006706f0ee155207100946
-
SSDEEP
49152:6ztyl6vJ2raXerXv/oV/5EKKyVzpMmd6CAzHXFOp+MdawAb8cOWthHMQRWzQfQ09:4yafav/lrzHEpib8dWbC8L8+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Vidar family
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-