General
-
Target
2025-01-04_46dd34531761bbc552766131c1ac05ca_frostygoop_poet-rat_snatch
-
Size
4.2MB
-
Sample
250104-cg6ceavqew
-
MD5
46dd34531761bbc552766131c1ac05ca
-
SHA1
77de42cebb838e1c33baf9e05dffcc72b193ec8e
-
SHA256
bf142408e335b4fe9f03495b4eaf5629b30f8d9c7433c44b7532d42c67b4ad3f
-
SHA512
73f55f275b3d5220ccecb14fb2466a816ad14abfc863764b81be425b366f0681f693339fd15613761a997be1e6d78e2d72cea3282bb50dca54472ae5aac68f17
-
SSDEEP
49152:ImwTL1n769zo6wqdvplsq9oLc9sf/sygrCqEVjOCszxGsbcKPkQxnK:gLJ96BOc9B4KcK8cn
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-04_46dd34531761bbc552766131c1ac05ca_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
meetvoov
http://185.216.71.4
-
url_path
/feed7c30357659ed.php
Targets
-
-
Target
2025-01-04_46dd34531761bbc552766131c1ac05ca_frostygoop_poet-rat_snatch
-
Size
4.2MB
-
MD5
46dd34531761bbc552766131c1ac05ca
-
SHA1
77de42cebb838e1c33baf9e05dffcc72b193ec8e
-
SHA256
bf142408e335b4fe9f03495b4eaf5629b30f8d9c7433c44b7532d42c67b4ad3f
-
SHA512
73f55f275b3d5220ccecb14fb2466a816ad14abfc863764b81be425b366f0681f693339fd15613761a997be1e6d78e2d72cea3282bb50dca54472ae5aac68f17
-
SSDEEP
49152:ImwTL1n769zo6wqdvplsq9oLc9sf/sygrCqEVjOCszxGsbcKPkQxnK:gLJ96BOc9B4KcK8cn
-
Stealc family
-
Suspicious use of SetThreadContext
-