General
-
Target
2025-01-14_471c6b5729a07d95857664f3fabb5174_frostygoop_poet-rat_snatch
-
Size
5.5MB
-
Sample
250114-nvfvfsxlhx
-
MD5
471c6b5729a07d95857664f3fabb5174
-
SHA1
a4f00e596f032a7488438b1348cc3abcdfa8a68d
-
SHA256
cdf4ab4dc06c692c289b3968bf4cfb7602bbf26748c75213243d4bf088df8a64
-
SHA512
4b2d584fd484325d61506b4bd345c77759752dcc394c9d50fff2065a0f7489d32cc71ecdc4f866f174c74285728a199fa4d727a2e30b61c2e30ea74eb76c401b
-
SSDEEP
49152:G6+pKpg6gzWz/6g4qvbjwbIBq5XPWseXn1xXKPM5cbFx7u6nNBmU2Bj+9Jm1Qb0Q:GTpK21g6g46wGqJeblrXQ9
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-14_471c6b5729a07d95857664f3fabb5174_frostygoop_poet-rat_snatch.exe
Resource
win7-20240708-en
Malware Config
Extracted
lumma
https://tinpanckakgou.shop/api
Targets
-
-
Target
2025-01-14_471c6b5729a07d95857664f3fabb5174_frostygoop_poet-rat_snatch
-
Size
5.5MB
-
MD5
471c6b5729a07d95857664f3fabb5174
-
SHA1
a4f00e596f032a7488438b1348cc3abcdfa8a68d
-
SHA256
cdf4ab4dc06c692c289b3968bf4cfb7602bbf26748c75213243d4bf088df8a64
-
SHA512
4b2d584fd484325d61506b4bd345c77759752dcc394c9d50fff2065a0f7489d32cc71ecdc4f866f174c74285728a199fa4d727a2e30b61c2e30ea74eb76c401b
-
SSDEEP
49152:G6+pKpg6gzWz/6g4qvbjwbIBq5XPWseXn1xXKPM5cbFx7u6nNBmU2Bj+9Jm1Qb0Q:GTpK21g6g46wGqJeblrXQ9
-
Lumma family
-
Suspicious use of SetThreadContext
-