General
-
Target
2025-02-19_a57b9bde642ec10198010d43d5dac1ad_frostygoop_luca-stealer_poet-rat_snatch
-
Size
14.6MB
-
Sample
250219-x8b8vsyqx6
-
MD5
a57b9bde642ec10198010d43d5dac1ad
-
SHA1
cf2287d215683c22ac0d9c470fe474a0e50aaf46
-
SHA256
6197fb4df12b4959d598217fb3ac665f9c5989673e1a77a0d936b0a711d773cc
-
SHA512
34066742ec91f68a84bb383f70e215ed0818a08c13cdba059daf4e246143e3659d7bbe17ae05157ff6e29cccdf01e61422f4cf591493da4d9c27cde9b3590f48
-
SSDEEP
98304:56DISpWjeuYOfJ8DtrB/Gk8rZWOvAof/CTC8EV+yM02xd10/nxPswT0AfIgT5GiN:C3WjeuYOfkSvzh1V+UsM0AfntE
Behavioral task
behavioral1
Sample
2025-02-19_a57b9bde642ec10198010d43d5dac1ad_frostygoop_luca-stealer_poet-rat_snatch.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-02-19_a57b9bde642ec10198010d43d5dac1ad_frostygoop_luca-stealer_poet-rat_snatch.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
2025-02-19_a57b9bde642ec10198010d43d5dac1ad_frostygoop_luca-stealer_poet-rat_snatch
-
Size
14.6MB
-
MD5
a57b9bde642ec10198010d43d5dac1ad
-
SHA1
cf2287d215683c22ac0d9c470fe474a0e50aaf46
-
SHA256
6197fb4df12b4959d598217fb3ac665f9c5989673e1a77a0d936b0a711d773cc
-
SHA512
34066742ec91f68a84bb383f70e215ed0818a08c13cdba059daf4e246143e3659d7bbe17ae05157ff6e29cccdf01e61422f4cf591493da4d9c27cde9b3590f48
-
SSDEEP
98304:56DISpWjeuYOfJ8DtrB/Gk8rZWOvAof/CTC8EV+yM02xd10/nxPswT0AfIgT5GiN:C3WjeuYOfkSvzh1V+UsM0AfntE
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1