General
-
Target
2024-12-24_6d57879698d5a1322220f5065b288e9a_frostygoop_poet-rat_snatch
-
Size
4.8MB
-
Sample
241224-nxn9lswpey
-
MD5
6d57879698d5a1322220f5065b288e9a
-
SHA1
daf749266179f05ea63eaf595a4bfbc59cc44b3b
-
SHA256
f9e6900b3cf0b20f50dfedc0e2f74ff5b66bf40335b1edfb15200fa5b1026cc1
-
SHA512
67c08b14f057c0be3d2ab85e388e46e0a935d9357f679a4154924507d5de0125929894a51f524342d5d7dd981241626fb98c511cdb41eebeafc04aa963056176
-
SSDEEP
49152:cpfQgfL06Ien/QV/5EKKyVzpMSqSzXo8fsPx7vwoQXzm4SpE28InoOy3c+Xz8H9J:kowZHn/SBzXtszQXC4Y+Q4
Behavioral task
behavioral1
Sample
2024-12-24_6d57879698d5a1322220f5065b288e9a_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
911
Extracted
vidar
2.4
589
https://t.me/gurutist
https://steamcommunity.com/profiles/76561199476091435
http://95.216.164.28:80
-
profile_id
589
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36
Targets
-
-
Target
2024-12-24_6d57879698d5a1322220f5065b288e9a_frostygoop_poet-rat_snatch
-
Size
4.8MB
-
MD5
6d57879698d5a1322220f5065b288e9a
-
SHA1
daf749266179f05ea63eaf595a4bfbc59cc44b3b
-
SHA256
f9e6900b3cf0b20f50dfedc0e2f74ff5b66bf40335b1edfb15200fa5b1026cc1
-
SHA512
67c08b14f057c0be3d2ab85e388e46e0a935d9357f679a4154924507d5de0125929894a51f524342d5d7dd981241626fb98c511cdb41eebeafc04aa963056176
-
SSDEEP
49152:cpfQgfL06Ien/QV/5EKKyVzpMSqSzXo8fsPx7vwoQXzm4SpE28InoOy3c+Xz8H9J:kowZHn/SBzXtszQXC4Y+Q4
-
Vidar family
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-