General
-
Target
2024-12-31_a39505eb713f66996a3c1dd0acf0941e_frostygoop_poet-rat_snatch
-
Size
3.8MB
-
Sample
241231-d1k19avpbt
-
MD5
a39505eb713f66996a3c1dd0acf0941e
-
SHA1
eadc67c9b914a9b3e0fb8341d9074f6a252e27b8
-
SHA256
01bddda60aa2447c76d3af6d8639996c06cf192d8ceb82b24172dd836ed62e5d
-
SHA512
89a437c9a7aed996136f11724e85b95ae005896476cacaac9c84c7938b3b1c19acb7e7a4664c93956ef4f320efe8728a556acc1ea2ef6a0ef8c76fee94a41a1e
-
SSDEEP
49152:yx0uAJAxX0YdindluiIoFcr/sy/sdBEVjOkwKpp+cKPZB:xuA6nUCoFuwcp+cKB
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-31_a39505eb713f66996a3c1dd0acf0941e_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
Targets
-
-
Target
2024-12-31_a39505eb713f66996a3c1dd0acf0941e_frostygoop_poet-rat_snatch
-
Size
3.8MB
-
MD5
a39505eb713f66996a3c1dd0acf0941e
-
SHA1
eadc67c9b914a9b3e0fb8341d9074f6a252e27b8
-
SHA256
01bddda60aa2447c76d3af6d8639996c06cf192d8ceb82b24172dd836ed62e5d
-
SHA512
89a437c9a7aed996136f11724e85b95ae005896476cacaac9c84c7938b3b1c19acb7e7a4664c93956ef4f320efe8728a556acc1ea2ef6a0ef8c76fee94a41a1e
-
SSDEEP
49152:yx0uAJAxX0YdindluiIoFcr/sy/sdBEVjOkwKpp+cKPZB:xuA6nUCoFuwcp+cKB
-
Lumma family
-
Suspicious use of SetThreadContext
-