General
-
Target
2025-01-28_f3ac472fad06e13f95924e20dae6bf3a_frostygoop_poet-rat_snatch
-
Size
6.4MB
-
Sample
250128-g6hd4azrbm
-
MD5
f3ac472fad06e13f95924e20dae6bf3a
-
SHA1
63c7f85da8009e917f56ce935d5abd26972764f7
-
SHA256
e82d4577cac75f1c311b9e86aefb553a518340cc0d52023e21d877909b23513e
-
SHA512
164fe2ee149cbe7dd62dc6a26a125153991780ad13b1c4c1a0100d54f53253cc19874feddcb5cc952d37f951130464e0a7aafa920fec75f02c215973b0fe3aa1
-
SSDEEP
49152:/rVH9wJ2mIN21UWc0rL9fo4kr0rJ9CqZ4wCaskewltaEe6UdZ8ZORD17:t9Fm22O0rW7r9wCK
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-28_f3ac472fad06e13f95924e20dae6bf3a_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
https://t.me/sc1phell
https://steamcommunity.com/profiles/76561199819539662
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Targets
-
-
Target
2025-01-28_f3ac472fad06e13f95924e20dae6bf3a_frostygoop_poet-rat_snatch
-
Size
6.4MB
-
MD5
f3ac472fad06e13f95924e20dae6bf3a
-
SHA1
63c7f85da8009e917f56ce935d5abd26972764f7
-
SHA256
e82d4577cac75f1c311b9e86aefb553a518340cc0d52023e21d877909b23513e
-
SHA512
164fe2ee149cbe7dd62dc6a26a125153991780ad13b1c4c1a0100d54f53253cc19874feddcb5cc952d37f951130464e0a7aafa920fec75f02c215973b0fe3aa1
-
SSDEEP
49152:/rVH9wJ2mIN21UWc0rL9fo4kr0rJ9CqZ4wCaskewltaEe6UdZ8ZORD17:t9Fm22O0rW7r9wCK
-
Detect Vidar Stealer
-
Vidar family
-
Suspicious use of SetThreadContext
-