General
-
Target
2025-01-30_d17d6610ff9216ef35c925c394241912_frostygoop_poet-rat_snatch
-
Size
9.8MB
-
Sample
250130-nt5r7aznaw
-
MD5
d17d6610ff9216ef35c925c394241912
-
SHA1
38ce69bfe22f4191515e96f69cc57a52fc126a2e
-
SHA256
45d3eebda68fe5b90e76049bd064e140d5b07e2ea0af5497b3b6e43c1cd1cf7c
-
SHA512
f8f13cdefe795af91e7fed03844a0ccf3cb98691a67c4c09ad822d01d54e3e313bdb9715dfee28b6f4716f5d27df3f40cd5c1a6770221da32f936fe23412c713
-
SSDEEP
98304:IWlC18CzkF6kJdZi/lBMoo6Yc3A2o5APDG5:PlW1BMoOED
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-30_d17d6610ff9216ef35c925c394241912_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://toppyneedus.biz/api
Targets
-
-
Target
2025-01-30_d17d6610ff9216ef35c925c394241912_frostygoop_poet-rat_snatch
-
Size
9.8MB
-
MD5
d17d6610ff9216ef35c925c394241912
-
SHA1
38ce69bfe22f4191515e96f69cc57a52fc126a2e
-
SHA256
45d3eebda68fe5b90e76049bd064e140d5b07e2ea0af5497b3b6e43c1cd1cf7c
-
SHA512
f8f13cdefe795af91e7fed03844a0ccf3cb98691a67c4c09ad822d01d54e3e313bdb9715dfee28b6f4716f5d27df3f40cd5c1a6770221da32f936fe23412c713
-
SSDEEP
98304:IWlC18CzkF6kJdZi/lBMoo6Yc3A2o5APDG5:PlW1BMoOED
-
Lumma family
-
Suspicious use of SetThreadContext
-