General
-
Target
2024-12-30_9bfa369cf63f3321cd1209024136757d_frostygoop_poet-rat_snatch
-
Size
3.9MB
-
Sample
241230-b9h7xatphr
-
MD5
9bfa369cf63f3321cd1209024136757d
-
SHA1
99bbac50249e89231f147ffd687513d48db7721c
-
SHA256
d7832af12e4f1a11257a9e8c81818662c2d9f31699d4bfed2400d6cb543c9842
-
SHA512
1417b71cef7ab515bcad15cf07868e2b6c4cc9efe8884cf2f165eb22072b45555bed1f2c1751ff00bff9acb51c7264c75754b9ee4b4a5132421c1cd9a77f1d4b
-
SSDEEP
49152:gY+dBq0Ay69kgodVU9IoFc4vcSy8YIEpGRjqOjvB2gl6rRoacKPTF:GdB6o5BoFmGjv2cKb
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-30_9bfa369cf63f3321cd1209024136757d_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
Targets
-
-
Target
2024-12-30_9bfa369cf63f3321cd1209024136757d_frostygoop_poet-rat_snatch
-
Size
3.9MB
-
MD5
9bfa369cf63f3321cd1209024136757d
-
SHA1
99bbac50249e89231f147ffd687513d48db7721c
-
SHA256
d7832af12e4f1a11257a9e8c81818662c2d9f31699d4bfed2400d6cb543c9842
-
SHA512
1417b71cef7ab515bcad15cf07868e2b6c4cc9efe8884cf2f165eb22072b45555bed1f2c1751ff00bff9acb51c7264c75754b9ee4b4a5132421c1cd9a77f1d4b
-
SSDEEP
49152:gY+dBq0Ay69kgodVU9IoFc4vcSy8YIEpGRjqOjvB2gl6rRoacKPTF:GdB6o5BoFmGjv2cKb
-
Lumma family
-
Suspicious use of SetThreadContext
-