General
-
Target
2025-02-18_bbeb66cbf8e63cd7779f4369807172f6_frostygoop_luca-stealer_poet-rat_snatch
-
Size
7.9MB
-
Sample
250218-kgw3qszqz3
-
MD5
bbeb66cbf8e63cd7779f4369807172f6
-
SHA1
44fe19a29c2de7bad8fb83c5c295d772e80e9351
-
SHA256
66b6a919c0964c8c9796059010d23defd9d6569e29efb16270b61df0dda2d6d1
-
SHA512
9c29a4ab8c7bc4cebfb56dc474230b5af5daf6dc05de8a682c09e523b64d6fdc0d4b199a8d2618c5a5da34c047dfd6ac423366b6ec66002f00095ce6858edb5c
-
SSDEEP
98304:n/vXYEqxkpM36eN6TC+HEisW28Ltd3VL7eKnODkmKNA1:1ekpMATAiP9L7eBgE
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-18_bbeb66cbf8e63cd7779f4369807172f6_frostygoop_luca-stealer_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-18_bbeb66cbf8e63cd7779f4369807172f6_frostygoop_luca-stealer_poet-rat_snatch.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
2025-02-18_bbeb66cbf8e63cd7779f4369807172f6_frostygoop_luca-stealer_poet-rat_snatch
-
Size
7.9MB
-
MD5
bbeb66cbf8e63cd7779f4369807172f6
-
SHA1
44fe19a29c2de7bad8fb83c5c295d772e80e9351
-
SHA256
66b6a919c0964c8c9796059010d23defd9d6569e29efb16270b61df0dda2d6d1
-
SHA512
9c29a4ab8c7bc4cebfb56dc474230b5af5daf6dc05de8a682c09e523b64d6fdc0d4b199a8d2618c5a5da34c047dfd6ac423366b6ec66002f00095ce6858edb5c
-
SSDEEP
98304:n/vXYEqxkpM36eN6TC+HEisW28Ltd3VL7eKnODkmKNA1:1ekpMATAiP9L7eBgE
Score8/10-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Authentication Process
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1