General

  • Target

    2025-02-18_bbeb66cbf8e63cd7779f4369807172f6_frostygoop_luca-stealer_poet-rat_snatch

  • Size

    7.9MB

  • Sample

    250218-kgw3qszqz3

  • MD5

    bbeb66cbf8e63cd7779f4369807172f6

  • SHA1

    44fe19a29c2de7bad8fb83c5c295d772e80e9351

  • SHA256

    66b6a919c0964c8c9796059010d23defd9d6569e29efb16270b61df0dda2d6d1

  • SHA512

    9c29a4ab8c7bc4cebfb56dc474230b5af5daf6dc05de8a682c09e523b64d6fdc0d4b199a8d2618c5a5da34c047dfd6ac423366b6ec66002f00095ce6858edb5c

  • SSDEEP

    98304:n/vXYEqxkpM36eN6TC+HEisW28Ltd3VL7eKnODkmKNA1:1ekpMATAiP9L7eBgE

Malware Config

Targets

    • Target

      2025-02-18_bbeb66cbf8e63cd7779f4369807172f6_frostygoop_luca-stealer_poet-rat_snatch

    • Size

      7.9MB

    • MD5

      bbeb66cbf8e63cd7779f4369807172f6

    • SHA1

      44fe19a29c2de7bad8fb83c5c295d772e80e9351

    • SHA256

      66b6a919c0964c8c9796059010d23defd9d6569e29efb16270b61df0dda2d6d1

    • SHA512

      9c29a4ab8c7bc4cebfb56dc474230b5af5daf6dc05de8a682c09e523b64d6fdc0d4b199a8d2618c5a5da34c047dfd6ac423366b6ec66002f00095ce6858edb5c

    • SSDEEP

      98304:n/vXYEqxkpM36eN6TC+HEisW28Ltd3VL7eKnODkmKNA1:1ekpMATAiP9L7eBgE

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks