General
-
Target
2025-01-10_90499826a12f9747c62ff3be6b67dc78_frostygoop_poet-rat_snatch
-
Size
3.9MB
-
Sample
250110-cendtazqbl
-
MD5
90499826a12f9747c62ff3be6b67dc78
-
SHA1
82712e3ce8cca6d3d660bbc3a11366926831b9e7
-
SHA256
9fefbe02b9fd10366a2b18c2c0c94a482f6e2845ee79aafde22067abfb5fa1fc
-
SHA512
3a762500c0b885cb08903cad03cd51b04631933c90e267c3e4ca6490427470eddef2c50cdf7b47b6086f3ca2809693b85c1d4b3142e96219350f66f373aba55f
-
SSDEEP
49152:PhXQ7GoaXNodyHd2+iYoFce/sy48tQ3EVjr3clSLzcKPW001:5Q7Q+kPoF1y4cKOz1
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-10_90499826a12f9747c62ff3be6b67dc78_frostygoop_poet-rat_snatch.exe
Resource
win7-20241010-en
Malware Config
Extracted
lumma
Targets
-
-
Target
2025-01-10_90499826a12f9747c62ff3be6b67dc78_frostygoop_poet-rat_snatch
-
Size
3.9MB
-
MD5
90499826a12f9747c62ff3be6b67dc78
-
SHA1
82712e3ce8cca6d3d660bbc3a11366926831b9e7
-
SHA256
9fefbe02b9fd10366a2b18c2c0c94a482f6e2845ee79aafde22067abfb5fa1fc
-
SHA512
3a762500c0b885cb08903cad03cd51b04631933c90e267c3e4ca6490427470eddef2c50cdf7b47b6086f3ca2809693b85c1d4b3142e96219350f66f373aba55f
-
SSDEEP
49152:PhXQ7GoaXNodyHd2+iYoFce/sy48tQ3EVjr3clSLzcKPW001:5Q7Q+kPoF1y4cKOz1
-
Lumma family
-
Suspicious use of SetThreadContext
-