General
-
Target
2025-02-04_82a36fb2b9eaf1d539bd1f47519d33f0_frostygoop_hive_luca-stealer_snatch
-
Size
4.8MB
-
Sample
250204-v8xhpavjc1
-
MD5
82a36fb2b9eaf1d539bd1f47519d33f0
-
SHA1
0eecdc1b8ecd03fa8cad841e9a81497c025575a3
-
SHA256
88d3e05c1207189ee80f554e7462ca58a69c1c19657aa977904f7ce0047e5505
-
SHA512
6da93231bf189a1b9fe4e6e477d92714c709982548f9ce22e0d0a3dfeeefa06fe481539f01d60cd1e3849873e01c24b25e41d78117e6a9c1ec7343821344abcf
-
SSDEEP
49152:w2NiZPNNirb/T2vO90dL3BmAFd4A64nsfJk0NuXCdmTQb0/6VCrrPrsbg11VgWAG:w2ANB04yIa0hsirubOWx4+
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-04_82a36fb2b9eaf1d539bd1f47519d33f0_frostygoop_hive_luca-stealer_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-04_82a36fb2b9eaf1d539bd1f47519d33f0_frostygoop_hive_luca-stealer_snatch.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
C:\Program Files\n8pw_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Targets
-
-
Target
2025-02-04_82a36fb2b9eaf1d539bd1f47519d33f0_frostygoop_hive_luca-stealer_snatch
-
Size
4.8MB
-
MD5
82a36fb2b9eaf1d539bd1f47519d33f0
-
SHA1
0eecdc1b8ecd03fa8cad841e9a81497c025575a3
-
SHA256
88d3e05c1207189ee80f554e7462ca58a69c1c19657aa977904f7ce0047e5505
-
SHA512
6da93231bf189a1b9fe4e6e477d92714c709982548f9ce22e0d0a3dfeeefa06fe481539f01d60cd1e3849873e01c24b25e41d78117e6a9c1ec7343821344abcf
-
SSDEEP
49152:w2NiZPNNirb/T2vO90dL3BmAFd4A64nsfJk0NuXCdmTQb0/6VCrrPrsbg11VgWAG:w2ANB04yIa0hsirubOWx4+
-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Disables service(s)
-
Hive family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies security service
-
Clears Windows event logs
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (1901) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
4Disable or Modify Tools
2Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1