General
-
Target
2025-02-04_a0c2c847f6fe20dac42d055859db98c2_frostygoop_hive_luca-stealer_snatch
-
Size
3.7MB
-
Sample
250204-pm114awlas
-
MD5
a0c2c847f6fe20dac42d055859db98c2
-
SHA1
d6ceb3eafd82a4bdc45750ba81b6b8786757b031
-
SHA256
62899c3f59b78d57a0211a9ffcb3701c28212595a63bdd4c932741f18aaabcf8
-
SHA512
d8844f407474102dc6aebb4f75e2cee2fda89791c4cb3596b45c527a65fbbb1003de9b5cd4a7261f9a8bd4f76d45976fe24101b4746718ed0626358e9237596b
-
SSDEEP
49152:5sPL/C8t4Zgrb/TqvO90dL3BmAFd4A64nsfJhmr9uvVdytIbNqCue0g+eNgJBye7:KPzOZImrI9wMNbSYeOI
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-04_a0c2c847f6fe20dac42d055859db98c2_frostygoop_hive_luca-stealer_snatch.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2025-02-04_a0c2c847f6fe20dac42d055859db98c2_frostygoop_hive_luca-stealer_snatch.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\ib68_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Targets
-
-
Target
2025-02-04_a0c2c847f6fe20dac42d055859db98c2_frostygoop_hive_luca-stealer_snatch
-
Size
3.7MB
-
MD5
a0c2c847f6fe20dac42d055859db98c2
-
SHA1
d6ceb3eafd82a4bdc45750ba81b6b8786757b031
-
SHA256
62899c3f59b78d57a0211a9ffcb3701c28212595a63bdd4c932741f18aaabcf8
-
SHA512
d8844f407474102dc6aebb4f75e2cee2fda89791c4cb3596b45c527a65fbbb1003de9b5cd4a7261f9a8bd4f76d45976fe24101b4746718ed0626358e9237596b
-
SSDEEP
49152:5sPL/C8t4Zgrb/TqvO90dL3BmAFd4A64nsfJhmr9uvVdytIbNqCue0g+eNgJBye7:KPzOZImrI9wMNbSYeOI
-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Disables service(s)
-
Hive family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies security service
-
Clears Windows event logs
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (1841) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
4Disable or Modify Tools
2Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1