General
-
Target
2025-01-25_de0c58184b144682937ad583f399acfd_frostygoop_poet-rat_snatch
-
Size
11.3MB
-
Sample
250125-rt5zqswqex
-
MD5
de0c58184b144682937ad583f399acfd
-
SHA1
a16cb29a8d7100fd56dd87a8352539f80cf6040f
-
SHA256
7648967679b5c0d71910ddd7c97f399d0f929f3ae31fb6020ee1272b2be0b4b2
-
SHA512
4ee37216037a03264278b16b849d8a6d7beb93dbf96ad47b93f46437b78aa40de8201c1da6cccc9143edd522a72bfcd21fa4104fd5758124c7d2a960808d45e3
-
SSDEEP
98304:c1tPv4nil4FZCa/sMwvIuCB7dtKk9o/0/XvFyrMuVPJGoL2MG:QtH6HsMwguWdQ8j/Xvk4uhJGTt
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-25_de0c58184b144682937ad583f399acfd_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://kitestarepatt.click/api
Targets
-
-
Target
2025-01-25_de0c58184b144682937ad583f399acfd_frostygoop_poet-rat_snatch
-
Size
11.3MB
-
MD5
de0c58184b144682937ad583f399acfd
-
SHA1
a16cb29a8d7100fd56dd87a8352539f80cf6040f
-
SHA256
7648967679b5c0d71910ddd7c97f399d0f929f3ae31fb6020ee1272b2be0b4b2
-
SHA512
4ee37216037a03264278b16b849d8a6d7beb93dbf96ad47b93f46437b78aa40de8201c1da6cccc9143edd522a72bfcd21fa4104fd5758124c7d2a960808d45e3
-
SSDEEP
98304:c1tPv4nil4FZCa/sMwvIuCB7dtKk9o/0/XvFyrMuVPJGoL2MG:QtH6HsMwguWdQ8j/Xvk4uhJGTt
-
Lumma family
-
Suspicious use of SetThreadContext
-