Analysis

  • max time kernel
    92s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2025, 13:48

General

  • Target

    2025-02-25_eb6c4f40fa973187c34e2b60364005a0_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe

  • Size

    15.4MB

  • MD5

    eb6c4f40fa973187c34e2b60364005a0

  • SHA1

    83a5629443d8c57c86a6c8cd5e9c55310f264736

  • SHA256

    e61e1edbcce319e173fceece32f68b2de977c0072755cadf1c89ae63c4a2df73

  • SHA512

    394d2e52c43e12e67e626408f87dccfd196cd567c29674c7c4ff4c151148919eceb1a46b84ac15029f318aebc102a60224cb351b2d177cd823f86f6dc925bc17

  • SSDEEP

    98304:CmNfo7aRF9qlKiRrJpjFD1N5FAvrjljEs7dq0Jf3YvzxjZ5fxuYK0YDy1JJCJcfn:CH7q9q5pjFD1Nkdws7EgiRZMOaih7

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-02-25_eb6c4f40fa973187c34e2b60364005a0_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-02-25_eb6c4f40fa973187c34e2b60364005a0_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Windows\system32\attrib.exe
      attrib +h +s C:\Users\Admin\AppData\Local\Temp\2025-02-25_eb6c4f40fa973187c34e2b60364005a0_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
      2⤵
      • Views/modifies file attributes
      PID:1664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads