General
-
Target
2025-01-13_ab5fb8172e727b9daf942e850862a343_frostygoop_poet-rat_snatch
-
Size
3.9MB
-
Sample
250113-b11etsyre1
-
MD5
ab5fb8172e727b9daf942e850862a343
-
SHA1
8e3cccfe2fa3aceb1113d515355bfcb5a4c8d9b1
-
SHA256
fdfe71687b7d37857215519b071f4626161e6b2d233025f65a88e484637613af
-
SHA512
774daee18b6b83ebd3d4b4884b64f8c2676fd881587ed0985710798dd372dd22914d674c59e47b966904976d0ab382f74a0072154251c5e9f678125658ff9b9a
-
SSDEEP
49152:YY+dBq0Ay69kgodVU9IoFc4vcSy8YIEpGRjqOjvB2gl6rRoacKPTF:udB6o5BoFmGjv2cKb
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-13_ab5fb8172e727b9daf942e850862a343_frostygoop_poet-rat_snatch.exe
Resource
win7-20240729-en
Malware Config
Extracted
lumma
Targets
-
-
Target
2025-01-13_ab5fb8172e727b9daf942e850862a343_frostygoop_poet-rat_snatch
-
Size
3.9MB
-
MD5
ab5fb8172e727b9daf942e850862a343
-
SHA1
8e3cccfe2fa3aceb1113d515355bfcb5a4c8d9b1
-
SHA256
fdfe71687b7d37857215519b071f4626161e6b2d233025f65a88e484637613af
-
SHA512
774daee18b6b83ebd3d4b4884b64f8c2676fd881587ed0985710798dd372dd22914d674c59e47b966904976d0ab382f74a0072154251c5e9f678125658ff9b9a
-
SSDEEP
49152:YY+dBq0Ay69kgodVU9IoFc4vcSy8YIEpGRjqOjvB2gl6rRoacKPTF:udB6o5BoFmGjv2cKb
-
Lumma family
-
Suspicious use of SetThreadContext
-