General
-
Target
2025-02-25_4d9462d9fbb8b233ca5120223d373e27_frostygoop_luca-stealer_ngrbot_poet-rat_snatch
-
Size
14.8MB
-
Sample
250225-rtegsazmz6
-
MD5
4d9462d9fbb8b233ca5120223d373e27
-
SHA1
66cde09b46244f1883a93403d2c218688f05987a
-
SHA256
f6888a1b623400e61788d15b9b8ccc496f39bcd8689ab726f12652047dcfbeb7
-
SHA512
6df6ebd1cb58eac9c79b29420b31dbf829389b78d2aef17ca5306ed332c6dd1df4cd0d187632bfe6af73ca85736a55ff922491882b53b24178e0cf50eb499365
-
SSDEEP
196608:KqZ4f/oCqKqc/3h4Po9YXx+29GAB7ob73mrVGwYdNE2vfUWm:xZ4XoBKHY9AuM73gQDvfUWm
Behavioral task
behavioral1
Sample
2025-02-25_4d9462d9fbb8b233ca5120223d373e27_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-02-25_4d9462d9fbb8b233ca5120223d373e27_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
skuld
https://ptb.discord.com/api/webhooks/1328831575789670452/xCCdIHtUlgPrQV3300CuNBr_DVbCb2fTTBtkXn4qDJnuJPpmJOp5dKrjZT4B0XHJ4OMa
Targets
-
-
Target
2025-02-25_4d9462d9fbb8b233ca5120223d373e27_frostygoop_luca-stealer_ngrbot_poet-rat_snatch
-
Size
14.8MB
-
MD5
4d9462d9fbb8b233ca5120223d373e27
-
SHA1
66cde09b46244f1883a93403d2c218688f05987a
-
SHA256
f6888a1b623400e61788d15b9b8ccc496f39bcd8689ab726f12652047dcfbeb7
-
SHA512
6df6ebd1cb58eac9c79b29420b31dbf829389b78d2aef17ca5306ed332c6dd1df4cd0d187632bfe6af73ca85736a55ff922491882b53b24178e0cf50eb499365
-
SSDEEP
196608:KqZ4f/oCqKqc/3h4Po9YXx+29GAB7ob73mrVGwYdNE2vfUWm:xZ4XoBKHY9AuM73gQDvfUWm
Score10/10-
Skuld family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-