General
-
Target
2025-02-25_3607ba045853985118b8d54b91122154_frostygoop_luca-stealer_ngrbot_poet-rat_snatch
-
Size
14.8MB
-
Sample
250225-rleskszjs3
-
MD5
3607ba045853985118b8d54b91122154
-
SHA1
d559b1e885f50924c7e0cd85d224411c9e1e6c1d
-
SHA256
bfd7bc73191eab1c1c812a0a7a5aea593be09a8a0703bda1171879fc13a67bea
-
SHA512
30267a06ecb383488ad30cf49c6a72dca71a9935cea610b12e2ae79e4abe02c6f0a0a3b40698919b65682f39be0213c607e384aa2c6b87bf9be067e8ea104607
-
SSDEEP
196608:KqZ4f/oCqKqc/3h4Po9YXx+29GAB7ob73mrVGwYdNE2vfUWZ:xZ4XoBKHY9AuM73gQDvfUWZ
Behavioral task
behavioral1
Sample
2025-02-25_3607ba045853985118b8d54b91122154_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-25_3607ba045853985118b8d54b91122154_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
skuld
https://ptb.discord.com/api/webhooks/1328831575789670452/xCCdIHtUlgPrQV3300CuNBr_DVbCb2fTTBtkXn4qDJnuJPpmJOp5dKrjZT4B0XHJ4OMa
Targets
-
-
Target
2025-02-25_3607ba045853985118b8d54b91122154_frostygoop_luca-stealer_ngrbot_poet-rat_snatch
-
Size
14.8MB
-
MD5
3607ba045853985118b8d54b91122154
-
SHA1
d559b1e885f50924c7e0cd85d224411c9e1e6c1d
-
SHA256
bfd7bc73191eab1c1c812a0a7a5aea593be09a8a0703bda1171879fc13a67bea
-
SHA512
30267a06ecb383488ad30cf49c6a72dca71a9935cea610b12e2ae79e4abe02c6f0a0a3b40698919b65682f39be0213c607e384aa2c6b87bf9be067e8ea104607
-
SSDEEP
196608:KqZ4f/oCqKqc/3h4Po9YXx+29GAB7ob73mrVGwYdNE2vfUWZ:xZ4XoBKHY9AuM73gQDvfUWZ
Score10/10-
Skuld family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-