General
-
Target
2025-01-31_3cf8d69e91716ebd306db75e4a86c5e4_frostygoop_poet-rat_snatch
-
Size
8.0MB
-
Sample
250131-ffth1aylgv
-
MD5
3cf8d69e91716ebd306db75e4a86c5e4
-
SHA1
a18deace73fcd34cd3332737fd0a0e43523b2984
-
SHA256
c8174ab32878d197551483a548fab68ad07780636e306e3301ea85eb997018c6
-
SHA512
03ed16554b38ca09092c80920eada97d0b350c96b44965504414a6f1c374d0c61aa1c2f8ec7f0806db4c3f1ae569774ad42b1959f49a0e6ec8c90614a0ff269b
-
SSDEEP
98304:/7oSpQ1t3J5zdwqY5NIe+omNZB9uSixzawicrrIZ:zvctzY5+jPuGDc/I
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-31_3cf8d69e91716ebd306db75e4a86c5e4_frostygoop_poet-rat_snatch.exe
Resource
win7-20240708-en
Malware Config
Extracted
lumma
https://toppyneedus.biz/api
Targets
-
-
Target
2025-01-31_3cf8d69e91716ebd306db75e4a86c5e4_frostygoop_poet-rat_snatch
-
Size
8.0MB
-
MD5
3cf8d69e91716ebd306db75e4a86c5e4
-
SHA1
a18deace73fcd34cd3332737fd0a0e43523b2984
-
SHA256
c8174ab32878d197551483a548fab68ad07780636e306e3301ea85eb997018c6
-
SHA512
03ed16554b38ca09092c80920eada97d0b350c96b44965504414a6f1c374d0c61aa1c2f8ec7f0806db4c3f1ae569774ad42b1959f49a0e6ec8c90614a0ff269b
-
SSDEEP
98304:/7oSpQ1t3J5zdwqY5NIe+omNZB9uSixzawicrrIZ:zvctzY5+jPuGDc/I
-
Lumma family
-
Suspicious use of SetThreadContext
-