General
-
Target
2025-02-16_0e26fb260ff03a040563a9e959169dcb_frostygoop_luca-stealer_ngrbot_poet-rat_snatch
-
Size
14.8MB
-
Sample
250216-xq538awlgx
-
MD5
0e26fb260ff03a040563a9e959169dcb
-
SHA1
959f06bdd27f26de50fa62cecae90cd9d2abc0e8
-
SHA256
0939d0feb44f3cd7ce0d18ad8bf5ab589aeeff42f43b2a2a4fb43bb6666a8485
-
SHA512
52c0fcc56aac61f98ed8e65fe15753f0c35ae5881afcc87a45b5f0c90e9958cf3be1f181cf3ace9efafead91fa5594b53b9799dc9ddc73bb2cab57bc9d753f5f
-
SSDEEP
196608:4qZ4f/oCqKqc/3h4Po95Xx+29GAB7ob73mrVGwYdNE2vfUWc:TZ4XoBKH59AuM73gQDvfUWc
Behavioral task
behavioral1
Sample
2025-02-16_0e26fb260ff03a040563a9e959169dcb_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-16_0e26fb260ff03a040563a9e959169dcb_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
skuld
https://ptb.discord.com/api/webhooks/1331762319012659321/iwnBhcdBis01WFBWpqJG9rYThk7-WhDDTh6m7jXrOXbNEJKcRQ9UVmGerYdicCteoenN
Targets
-
-
Target
2025-02-16_0e26fb260ff03a040563a9e959169dcb_frostygoop_luca-stealer_ngrbot_poet-rat_snatch
-
Size
14.8MB
-
MD5
0e26fb260ff03a040563a9e959169dcb
-
SHA1
959f06bdd27f26de50fa62cecae90cd9d2abc0e8
-
SHA256
0939d0feb44f3cd7ce0d18ad8bf5ab589aeeff42f43b2a2a4fb43bb6666a8485
-
SHA512
52c0fcc56aac61f98ed8e65fe15753f0c35ae5881afcc87a45b5f0c90e9958cf3be1f181cf3ace9efafead91fa5594b53b9799dc9ddc73bb2cab57bc9d753f5f
-
SSDEEP
196608:4qZ4f/oCqKqc/3h4Po95Xx+29GAB7ob73mrVGwYdNE2vfUWc:TZ4XoBKH59AuM73gQDvfUWc
Score10/10-
Skuld family
-
Downloads MZ/PE file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1