General
-
Target
2025-01-06_57c45ac56fbf70848c29ca4fb4deca79_frostygoop_poet-rat_snatch
-
Size
10.3MB
-
Sample
250106-pppe3synbm
-
MD5
57c45ac56fbf70848c29ca4fb4deca79
-
SHA1
456fa6047d5dceed78264d8d32c282139095e960
-
SHA256
dcecd10623153ef1caa7273abe579509fae7852bef0d93bd03b85f097455eff7
-
SHA512
3c41995c4c741fdab8c358acdf8196751908a75936ae68d18d3b1f5d9aa99e35c82a17bc885a63f36d4870347ec1aa96b65d65db9c02770b7f3b0a262580b2bd
-
SSDEEP
98304:vnHp9wIkkyhj/QaB4sIAokaUofmTALH8G49NjIGrXgD/ith6amNDqRh:vHpiIBm2AkmTbNjnrgqth6amMRh
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-06_57c45ac56fbf70848c29ca4fb4deca79_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
Targets
-
-
Target
2025-01-06_57c45ac56fbf70848c29ca4fb4deca79_frostygoop_poet-rat_snatch
-
Size
10.3MB
-
MD5
57c45ac56fbf70848c29ca4fb4deca79
-
SHA1
456fa6047d5dceed78264d8d32c282139095e960
-
SHA256
dcecd10623153ef1caa7273abe579509fae7852bef0d93bd03b85f097455eff7
-
SHA512
3c41995c4c741fdab8c358acdf8196751908a75936ae68d18d3b1f5d9aa99e35c82a17bc885a63f36d4870347ec1aa96b65d65db9c02770b7f3b0a262580b2bd
-
SSDEEP
98304:vnHp9wIkkyhj/QaB4sIAokaUofmTALH8G49NjIGrXgD/ith6amNDqRh:vHpiIBm2AkmTbNjnrgqth6amMRh
-
Lumma family
-
Suspicious use of SetThreadContext
-