General
-
Target
2025-02-20_6de71b0609cb1dcb47118be17d0d700c_frostygoop_poet-rat_snatch
-
Size
9.8MB
-
Sample
250220-t28fyaypbt
-
MD5
6de71b0609cb1dcb47118be17d0d700c
-
SHA1
98abf52de91ec36ac0d066345ecb8b2c96fdba50
-
SHA256
55a16f01b6e2b0b124a1c4221e6d7b27dd4571b9b6b7575c3a731cc2b2d1a0e4
-
SHA512
a0e01518116715d8e0196e09cf4036bf484eaa250b36151bf91fc91b3bd6bdca90cb7277ebc62e16a8c2d77d75f9ade558037cc6662e12aa8e85d02ac6d8c212
-
SSDEEP
98304:Owk7LhMpZoJaUfW8+3CPPEuSPawmHvhfcmTVbeGG0u:Lk3h82+3CyawmHvumTVbeGG
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-20_6de71b0609cb1dcb47118be17d0d700c_frostygoop_poet-rat_snatch.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-02-20_6de71b0609cb1dcb47118be17d0d700c_frostygoop_poet-rat_snatch.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Targets
-
-
Target
2025-02-20_6de71b0609cb1dcb47118be17d0d700c_frostygoop_poet-rat_snatch
-
Size
9.8MB
-
MD5
6de71b0609cb1dcb47118be17d0d700c
-
SHA1
98abf52de91ec36ac0d066345ecb8b2c96fdba50
-
SHA256
55a16f01b6e2b0b124a1c4221e6d7b27dd4571b9b6b7575c3a731cc2b2d1a0e4
-
SHA512
a0e01518116715d8e0196e09cf4036bf484eaa250b36151bf91fc91b3bd6bdca90cb7277ebc62e16a8c2d77d75f9ade558037cc6662e12aa8e85d02ac6d8c212
-
SSDEEP
98304:Owk7LhMpZoJaUfW8+3CPPEuSPawmHvhfcmTVbeGG0u:Lk3h82+3CyawmHvumTVbeGG
Score10/10-
Detect Vidar Stealer
-
Vidar family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Suspicious use of SetThreadContext
-