General

  • Target

    2025-01-16_7a0965bb0414e44ae8ab07b16ecac3fc_frostygoop_luca-stealer_poet-rat_snatch

  • Size

    14.3MB

  • Sample

    250116-b9awjawpem

  • MD5

    7a0965bb0414e44ae8ab07b16ecac3fc

  • SHA1

    116273a550ac4e7e97e314aba1b10feb3da6d684

  • SHA256

    09a1fba856d0b9da9365a6509a4bbfc28426260f03ba9bbb20b4a86f1b3032cf

  • SHA512

    600adc6de0ebf4e691adadb14605743f82cd8f56102dc725fdd7c85f775917b3fc387838a29d967b41d50ff9066494e58f971fa775297ce1b46eb1bb043a133d

  • SSDEEP

    196608:GTvklW4VEcZoLMDvNBtU/TTv1WSSb6tvRjS/:uvxlu3e1WLmvR

Malware Config

Targets

    • Target

      2025-01-16_7a0965bb0414e44ae8ab07b16ecac3fc_frostygoop_luca-stealer_poet-rat_snatch

    • Size

      14.3MB

    • MD5

      7a0965bb0414e44ae8ab07b16ecac3fc

    • SHA1

      116273a550ac4e7e97e314aba1b10feb3da6d684

    • SHA256

      09a1fba856d0b9da9365a6509a4bbfc28426260f03ba9bbb20b4a86f1b3032cf

    • SHA512

      600adc6de0ebf4e691adadb14605743f82cd8f56102dc725fdd7c85f775917b3fc387838a29d967b41d50ff9066494e58f971fa775297ce1b46eb1bb043a133d

    • SSDEEP

      196608:GTvklW4VEcZoLMDvNBtU/TTv1WSSb6tvRjS/:uvxlu3e1WLmvR

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks