General
-
Target
2024-12-30_33a426ffbbca2c8263c4b4c63e138eea_frostygoop_poet-rat_snatch
-
Size
830.9MB
-
Sample
241230-lecfzstqgl
-
MD5
33a426ffbbca2c8263c4b4c63e138eea
-
SHA1
2c6a02db4eaa89d31ffe396562a957d2b39076d0
-
SHA256
bd470f8b940459fd2e6ab5f5d0f1b76c3b010eba14ec3f44eced2e0edd7c5c0c
-
SHA512
a02f0d92b1723783a6449835d97b899aa5a8eabf9a3709cd03255f8dfdea583d19036f6dc1bea1a35f7597fcfc5dc652bcbd7498466815c6ff158ab21d2ebe39
-
SSDEEP
49152:e0JEHWJ65cZrFctPdSHdA8Ui4oFcU/sy4cNREVjb1PCWpmicKPd3:EW80yEwoFCPCWpmicKl
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-30_33a426ffbbca2c8263c4b4c63e138eea_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
Targets
-
-
Target
2024-12-30_33a426ffbbca2c8263c4b4c63e138eea_frostygoop_poet-rat_snatch
-
Size
830.9MB
-
MD5
33a426ffbbca2c8263c4b4c63e138eea
-
SHA1
2c6a02db4eaa89d31ffe396562a957d2b39076d0
-
SHA256
bd470f8b940459fd2e6ab5f5d0f1b76c3b010eba14ec3f44eced2e0edd7c5c0c
-
SHA512
a02f0d92b1723783a6449835d97b899aa5a8eabf9a3709cd03255f8dfdea583d19036f6dc1bea1a35f7597fcfc5dc652bcbd7498466815c6ff158ab21d2ebe39
-
SSDEEP
49152:e0JEHWJ65cZrFctPdSHdA8Ui4oFcU/sy4cNREVjb1PCWpmicKPd3:EW80yEwoFCPCWpmicKl
-
Lumma family
-
Suspicious use of SetThreadContext
-