General
-
Target
2025-01-28_fe00171f958fc344a818092b304d293f_frostygoop_poet-rat_snatch
-
Size
6.8MB
-
Sample
250128-vnwewsyldq
-
MD5
fe00171f958fc344a818092b304d293f
-
SHA1
8bb565e4788e134f648b86b6556479273abb9c22
-
SHA256
93551b76010072c536b3892ec706facd9e9be91266ac61c1dc7439924cc26ba6
-
SHA512
13bde6b25dd341b29c1ddf60b8344bcbe2d5b9e6a7105ade8767c997736e9e1e2796f4f34531cb390b7e9c02938e341b312099f8b53e553a0d28475a98c91f9c
-
SSDEEP
196608:ckTsRF90xFLaCQaM0R4srSe+9VWkfON5IXOATugWcU:VsxH
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-28_fe00171f958fc344a818092b304d293f_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://toppyneedus.biz/api
Targets
-
-
Target
2025-01-28_fe00171f958fc344a818092b304d293f_frostygoop_poet-rat_snatch
-
Size
6.8MB
-
MD5
fe00171f958fc344a818092b304d293f
-
SHA1
8bb565e4788e134f648b86b6556479273abb9c22
-
SHA256
93551b76010072c536b3892ec706facd9e9be91266ac61c1dc7439924cc26ba6
-
SHA512
13bde6b25dd341b29c1ddf60b8344bcbe2d5b9e6a7105ade8767c997736e9e1e2796f4f34531cb390b7e9c02938e341b312099f8b53e553a0d28475a98c91f9c
-
SSDEEP
196608:ckTsRF90xFLaCQaM0R4srSe+9VWkfON5IXOATugWcU:VsxH
-
Lumma family
-
Suspicious use of SetThreadContext
-