General
-
Target
2025-01-19_4693bb147035b175de0478a0d3e90b9b_frostygoop_poet-rat_snatch
-
Size
6.3MB
-
Sample
250119-cyq9tatjhp
-
MD5
4693bb147035b175de0478a0d3e90b9b
-
SHA1
00fdb48d88da37beb59013e4c42ed8cc8eb9cb0e
-
SHA256
37ef1e2cd2e1594572abad74d88463ef61179a0e8779b889c3c4364325b2f7c3
-
SHA512
4ec514aa399a799c09dc0cbeb3270a4d2b0d1475705ad7d1c15714aa6803ca154536313b3e8928759ae1c86caf633878e0fef4ee25b88d10cc73417bc891d3c3
-
SSDEEP
49152:ghZhvrCThcGj8J2ILpz8IyMBEGKDEYTEMAQNvbmi5saDCvGpDMTou4ku9C2fXCmw:kHrCuZ2IZDylEavqiNpDMToV9pflN
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-19_4693bb147035b175de0478a0d3e90b9b_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://clammyrobiny.cyou/api
Targets
-
-
Target
2025-01-19_4693bb147035b175de0478a0d3e90b9b_frostygoop_poet-rat_snatch
-
Size
6.3MB
-
MD5
4693bb147035b175de0478a0d3e90b9b
-
SHA1
00fdb48d88da37beb59013e4c42ed8cc8eb9cb0e
-
SHA256
37ef1e2cd2e1594572abad74d88463ef61179a0e8779b889c3c4364325b2f7c3
-
SHA512
4ec514aa399a799c09dc0cbeb3270a4d2b0d1475705ad7d1c15714aa6803ca154536313b3e8928759ae1c86caf633878e0fef4ee25b88d10cc73417bc891d3c3
-
SSDEEP
49152:ghZhvrCThcGj8J2ILpz8IyMBEGKDEYTEMAQNvbmi5saDCvGpDMTou4ku9C2fXCmw:kHrCuZ2IZDylEavqiNpDMToV9pflN
-
Lumma family
-
Suspicious use of SetThreadContext
-