General
-
Target
2025-01-24_fc16d3a937e20f30dfc2808e5a67b752_frostygoop_poet-rat_snatch
-
Size
7.4MB
-
Sample
250124-s1teyswrhk
-
MD5
fc16d3a937e20f30dfc2808e5a67b752
-
SHA1
300a3db8826aded0f2257856e8c6b1b6ac88ba64
-
SHA256
bc0dcc3a47b582f66386cb538572ed07ee0d2919398c496c5e9080ed5ef6e121
-
SHA512
362f290c4ab47935dbdb0ba21d0f051814a2c1f24df824fec71150db7be559faeb9c8498e53f712b600153fc2b756d530e0fb3ad9fe2cd6458f508c4af53ec98
-
SSDEEP
98304:WQcgMVVYQb+/Ux9a8ULs15xly8UEDf+bA6iyrAdWP:Wrzx9aOabF0dWP
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-24_fc16d3a937e20f30dfc2808e5a67b752_frostygoop_poet-rat_snatch.exe
Resource
win7-20240729-en
Malware Config
Extracted
lumma
https://toppyneedus.biz/api
Targets
-
-
Target
2025-01-24_fc16d3a937e20f30dfc2808e5a67b752_frostygoop_poet-rat_snatch
-
Size
7.4MB
-
MD5
fc16d3a937e20f30dfc2808e5a67b752
-
SHA1
300a3db8826aded0f2257856e8c6b1b6ac88ba64
-
SHA256
bc0dcc3a47b582f66386cb538572ed07ee0d2919398c496c5e9080ed5ef6e121
-
SHA512
362f290c4ab47935dbdb0ba21d0f051814a2c1f24df824fec71150db7be559faeb9c8498e53f712b600153fc2b756d530e0fb3ad9fe2cd6458f508c4af53ec98
-
SSDEEP
98304:WQcgMVVYQb+/Ux9a8ULs15xly8UEDf+bA6iyrAdWP:Wrzx9aOabF0dWP
-
Lumma family
-
Suspicious use of SetThreadContext
-