General
-
Target
2025-02-25_d4313e6b2d71c416e2e6b69872ce085d_frostygoop_luca-stealer_poet-rat_snatch
-
Size
7.6MB
-
Sample
250225-pzyfqsxjz9
-
MD5
d4313e6b2d71c416e2e6b69872ce085d
-
SHA1
9470fd83070763817c9b2711fa825daa96f6b19d
-
SHA256
150955b55f132c81c530f09688d303255c905fa502b94ea5268e7c1b30c20515
-
SHA512
9ba65e1f17e8554ef9df1c6617395b069c09a1f5c8bf755e165e6f137bfeb29db7944b22849caf363c4507556dc996ce0498cc737c00bc42ed5db14178d3341a
-
SSDEEP
98304:rmZkqcKQiHKEapowIfXozoUa2uWGRT3A6zXcC:vLKQi38sUiT3HY
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-25_d4313e6b2d71c416e2e6b69872ce085d_frostygoop_luca-stealer_poet-rat_snatch.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
2025-02-25_d4313e6b2d71c416e2e6b69872ce085d_frostygoop_luca-stealer_poet-rat_snatch.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7606564822:AAH6SI7NgYZB1dnjKbHRDd4jhtTCE4q5su0/sendMessage?chat_id=8199790517
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
2025-02-25_d4313e6b2d71c416e2e6b69872ce085d_frostygoop_luca-stealer_poet-rat_snatch
-
Size
7.6MB
-
MD5
d4313e6b2d71c416e2e6b69872ce085d
-
SHA1
9470fd83070763817c9b2711fa825daa96f6b19d
-
SHA256
150955b55f132c81c530f09688d303255c905fa502b94ea5268e7c1b30c20515
-
SHA512
9ba65e1f17e8554ef9df1c6617395b069c09a1f5c8bf755e165e6f137bfeb29db7944b22849caf363c4507556dc996ce0498cc737c00bc42ed5db14178d3341a
-
SSDEEP
98304:rmZkqcKQiHKEapowIfXozoUa2uWGRT3A6zXcC:vLKQi38sUiT3HY
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1