General
-
Target
2024-12-31_ac184f1d1bb5b5578315a67f810db20f_frostygoop_snatch
-
Size
3.6MB
-
Sample
241231-d11rpsvpdw
-
MD5
ac184f1d1bb5b5578315a67f810db20f
-
SHA1
bed97a34ed3090206d461fc9fbc24e05fb30c2c7
-
SHA256
d740964083499743a5c0431effbd417dcb7bb9cb7c45b7b30cbd4013774f0e63
-
SHA512
71749a7b90c37d74cf843756f8fda68eb56fac413e3548e0b15980c4bc8ea0e9f483715ce38bf2451480cbdc5553c9f2ebaf42077a42c85d14d04125a64e3b2f
-
SSDEEP
49152:oYfx+ufWVr/3XT1ZrWaQPF7IfxzceN+bzB+RXVzsuXZxiE6/E1nF18Gb:oYfN03DjrQbzBO
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-31_ac184f1d1bb5b5578315a67f810db20f_frostygoop_snatch.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Targets
-
-
Target
2024-12-31_ac184f1d1bb5b5578315a67f810db20f_frostygoop_snatch
-
Size
3.6MB
-
MD5
ac184f1d1bb5b5578315a67f810db20f
-
SHA1
bed97a34ed3090206d461fc9fbc24e05fb30c2c7
-
SHA256
d740964083499743a5c0431effbd417dcb7bb9cb7c45b7b30cbd4013774f0e63
-
SHA512
71749a7b90c37d74cf843756f8fda68eb56fac413e3548e0b15980c4bc8ea0e9f483715ce38bf2451480cbdc5553c9f2ebaf42077a42c85d14d04125a64e3b2f
-
SSDEEP
49152:oYfx+ufWVr/3XT1ZrWaQPF7IfxzceN+bzB+RXVzsuXZxiE6/E1nF18Gb:oYfN03DjrQbzBO
-
Lumma family
-
Suspicious use of SetThreadContext
-