General
-
Target
2025-01-10_f4c05e7aacfbaba7c021e411d4f4c71a_frostygoop_poet-rat_snatch
-
Size
3.9MB
-
Sample
250110-cjdp6szrfq
-
MD5
f4c05e7aacfbaba7c021e411d4f4c71a
-
SHA1
7092db8ac0d5d472d136f103f04d8016c48eb94a
-
SHA256
8f9b91b4280f55b8aefa9492acbbd4c6b51358d50e2e8e59594279432d78042d
-
SHA512
b2e02c57e31244c96d3ade570d0cf23fdf93e42b5ce1fb6058b1fe450bc575cd721ab226b248730f11060a035f3c03533f4e97ca3eb4f02c9215336be28c6cd8
-
SSDEEP
49152:E0JEHWJ65cZrFctPdSHdA8Ui4oFcU/sy4cN5EVjjchB0bp1/POecKPID:qW80yEwoFhhBARPOecKQ
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-10_f4c05e7aacfbaba7c021e411d4f4c71a_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
Targets
-
-
Target
2025-01-10_f4c05e7aacfbaba7c021e411d4f4c71a_frostygoop_poet-rat_snatch
-
Size
3.9MB
-
MD5
f4c05e7aacfbaba7c021e411d4f4c71a
-
SHA1
7092db8ac0d5d472d136f103f04d8016c48eb94a
-
SHA256
8f9b91b4280f55b8aefa9492acbbd4c6b51358d50e2e8e59594279432d78042d
-
SHA512
b2e02c57e31244c96d3ade570d0cf23fdf93e42b5ce1fb6058b1fe450bc575cd721ab226b248730f11060a035f3c03533f4e97ca3eb4f02c9215336be28c6cd8
-
SSDEEP
49152:E0JEHWJ65cZrFctPdSHdA8Ui4oFcU/sy4cN5EVjjchB0bp1/POecKPID:qW80yEwoFhhBARPOecKQ
-
Lumma family
-
Suspicious use of SetThreadContext
-