Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2025 19:12

General

  • Target

    2025-01-29_87d9620547c7aec66a66b34487e788a9_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe

  • Size

    32.8MB

  • MD5

    87d9620547c7aec66a66b34487e788a9

  • SHA1

    b0a907adf96e135ffb3b7f646b285836ccdfd953

  • SHA256

    25ed2a5c5ee660341e77c705adbf0b3ea2bbdbae58b6f7784888fa50cc0bc24d

  • SHA512

    07b60933f9e13db21c18519c3feab095ef4af1e8d2ffed82f71eee018d9d4bc7ee6825d6b71e8cbbddffe1ac3e0dafbec571206f79feebcf0131224a769a5022

  • SSDEEP

    393216:3Hjlm2aToRyR/iWVYDiJnFr7IUdwPyhpZKKcDmsmHS5HMCx:zlm2exiWwUnFrkqVpi

Malware Config

Signatures

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • GoLang User-Agent 4 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-29_87d9620547c7aec66a66b34487e788a9_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-29_87d9620547c7aec66a66b34487e788a9_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe"
    1⤵
    • Modifies system certificate store
    PID:3992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Local Storage\leveldb_7.temp\CURRENT.bak

    Filesize

    16B

    MD5

    46295cac801e5d4857d09837238a6394

    SHA1

    44e0fa1b517dbf802b18faf0785eeea6ac51594b

    SHA256

    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

    SHA512

    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

  • C:\Users\Admin\AppData\Local\Temp\Session Storage_8.temp\MANIFEST-000001

    Filesize

    41B

    MD5

    5af87dfd673ba2115e2fcf5cfdb727ab

    SHA1

    d5b5bbf396dc291274584ef71f444f420b6056f1

    SHA256

    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

    SHA512

    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b