General
-
Target
2025-02-12_af24d11848de1fc38d1cb6c08d36d306_frostygoop_luca-stealer_ngrbot_poet-rat_snatch
-
Size
14.8MB
-
Sample
250212-zp53yaxqfm
-
MD5
af24d11848de1fc38d1cb6c08d36d306
-
SHA1
acccb5e04025a64ef4a5c7708588749b04d155ff
-
SHA256
9583979209fadf3861eff01c297c2d8355e65e75dad1b63cc60f9045b2db966e
-
SHA512
f17fdb6166390159c5a5c107d64aba54b00567fa701a4f32f2a1a979435e0a0f77ff1d2a9c744b1383e8959f792711bf1ed9e36311f53b802ffc394ba6301bd5
-
SSDEEP
196608:4qZ4f/oCqKqc/3h4Po95Xx+29GAB7ob73mrVGwYdNE2vfUWf:TZ4XoBKH59AuM73gQDvfUWf
Behavioral task
behavioral1
Sample
2025-02-12_af24d11848de1fc38d1cb6c08d36d306_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-12_af24d11848de1fc38d1cb6c08d36d306_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
skuld
https://ptb.discord.com/api/webhooks/1331762319012659321/iwnBhcdBis01WFBWpqJG9rYThk7-WhDDTh6m7jXrOXbNEJKcRQ9UVmGerYdicCteoenN
Targets
-
-
Target
2025-02-12_af24d11848de1fc38d1cb6c08d36d306_frostygoop_luca-stealer_ngrbot_poet-rat_snatch
-
Size
14.8MB
-
MD5
af24d11848de1fc38d1cb6c08d36d306
-
SHA1
acccb5e04025a64ef4a5c7708588749b04d155ff
-
SHA256
9583979209fadf3861eff01c297c2d8355e65e75dad1b63cc60f9045b2db966e
-
SHA512
f17fdb6166390159c5a5c107d64aba54b00567fa701a4f32f2a1a979435e0a0f77ff1d2a9c744b1383e8959f792711bf1ed9e36311f53b802ffc394ba6301bd5
-
SSDEEP
196608:4qZ4f/oCqKqc/3h4Po95Xx+29GAB7ob73mrVGwYdNE2vfUWf:TZ4XoBKH59AuM73gQDvfUWf
Score10/10-
Skuld family
-
Downloads MZ/PE file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1