General
-
Target
2025-02-14_b27f82232705f46c872db1b71a4aa755_frostygoop_poet-rat_snatch
-
Size
5.6MB
-
Sample
250214-d3bwcs1nfy
-
MD5
b27f82232705f46c872db1b71a4aa755
-
SHA1
aaed5c68952124ab06dc9a54ede30344fd05fec5
-
SHA256
dc90777bd03548942ed4b0a37ec03bb527225e56bfa7cd13ba36a73fd1dec123
-
SHA512
3c920dd4e4db43db0def356d48a7f9bb17866f2b1106fe11478ebc04c318daf6a6c94e586b7396c009cf001a5548c1993b4a6956a408504189eff16a8ab023c5
-
SSDEEP
49152:PJiTLxmrxMgiQNXf34SF0VwUhu6NqQFn8vca9Ypyy7KQ+cKa/Et9m3OnytR1ljyc:P0TLxmFkQNXgU0ZqXHfaj3OQjy
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-14_b27f82232705f46c872db1b71a4aa755_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
https://t.me/sok33tn
https://steamcommunity.com/profiles/76561199824159981
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Targets
-
-
Target
2025-02-14_b27f82232705f46c872db1b71a4aa755_frostygoop_poet-rat_snatch
-
Size
5.6MB
-
MD5
b27f82232705f46c872db1b71a4aa755
-
SHA1
aaed5c68952124ab06dc9a54ede30344fd05fec5
-
SHA256
dc90777bd03548942ed4b0a37ec03bb527225e56bfa7cd13ba36a73fd1dec123
-
SHA512
3c920dd4e4db43db0def356d48a7f9bb17866f2b1106fe11478ebc04c318daf6a6c94e586b7396c009cf001a5548c1993b4a6956a408504189eff16a8ab023c5
-
SSDEEP
49152:PJiTLxmrxMgiQNXf34SF0VwUhu6NqQFn8vca9Ypyy7KQ+cKa/Et9m3OnytR1ljyc:P0TLxmFkQNXgU0ZqXHfaj3OQjy
-
Detect Vidar Stealer
-
Vidar family
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext
-