General
-
Target
2025-01-01_89963a73d0b80ec75760066916008189_frostygoop_poet-rat_snatch
-
Size
3.9MB
-
Sample
250101-mtx7nsvpcp
-
MD5
89963a73d0b80ec75760066916008189
-
SHA1
21bc6c62640a055a5272d29a096b4a9c67362721
-
SHA256
fab599fee768dc9a9c512d80f94b63f8c7d73222a6843da00ea3f73b95319cbb
-
SHA512
01a8cdd7f900479d08e8aedb4a1c23119b099746a3d5ee2d31f7cc0f6c0be83f8d9ca6fcb071263bc58824ab001a0f18ae820ed08a3f0ec1504dca213a47cecf
-
SSDEEP
49152:e0JEHWJ65cZrFctPdSHdA8Ui4oFcU/sy4cNREVjb1PCWpmicKPd3:EW80yEwoFCPCWpmicKl
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-01_89963a73d0b80ec75760066916008189_frostygoop_poet-rat_snatch.exe
Resource
win7-20241010-en
Malware Config
Extracted
lumma
Targets
-
-
Target
2025-01-01_89963a73d0b80ec75760066916008189_frostygoop_poet-rat_snatch
-
Size
3.9MB
-
MD5
89963a73d0b80ec75760066916008189
-
SHA1
21bc6c62640a055a5272d29a096b4a9c67362721
-
SHA256
fab599fee768dc9a9c512d80f94b63f8c7d73222a6843da00ea3f73b95319cbb
-
SHA512
01a8cdd7f900479d08e8aedb4a1c23119b099746a3d5ee2d31f7cc0f6c0be83f8d9ca6fcb071263bc58824ab001a0f18ae820ed08a3f0ec1504dca213a47cecf
-
SSDEEP
49152:e0JEHWJ65cZrFctPdSHdA8Ui4oFcU/sy4cNREVjb1PCWpmicKPd3:EW80yEwoFCPCWpmicKl
-
Lumma family
-
Suspicious use of SetThreadContext
-