General
-
Target
2025-03-29_6f08ceeabcccd821ffc938bda9ed61e7_frostygoop_poet-rat_sliver_snatch
-
Size
11.1MB
-
Sample
250329-zqjw4attcx
-
MD5
6f08ceeabcccd821ffc938bda9ed61e7
-
SHA1
b36b3f71afcdf771a8c0e8bca5c8168ad82152f2
-
SHA256
a4a030be981e596599ef91e961596552ef1c9b40e282ecf03502e11d6669b963
-
SHA512
8364b4b1524f6d5b1c545907d3e9e464b4a25b53969c09a8f29218b542d8e8516542a35cd2c245fffb71fc1f37ec60c6315525d7c49d8fb4327b5dded405f3c7
-
SSDEEP
98304:t1PJsVqzER9lYsEmUcqOuC6QtgzVPuBciF:KlliR7Egz9mcY
Behavioral task
behavioral1
Sample
2025-03-29_6f08ceeabcccd821ffc938bda9ed61e7_frostygoop_poet-rat_sliver_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-29_6f08ceeabcccd821ffc938bda9ed61e7_frostygoop_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
2025-03-29_6f08ceeabcccd821ffc938bda9ed61e7_frostygoop_poet-rat_sliver_snatch
-
Size
11.1MB
-
MD5
6f08ceeabcccd821ffc938bda9ed61e7
-
SHA1
b36b3f71afcdf771a8c0e8bca5c8168ad82152f2
-
SHA256
a4a030be981e596599ef91e961596552ef1c9b40e282ecf03502e11d6669b963
-
SHA512
8364b4b1524f6d5b1c545907d3e9e464b4a25b53969c09a8f29218b542d8e8516542a35cd2c245fffb71fc1f37ec60c6315525d7c49d8fb4327b5dded405f3c7
-
SSDEEP
98304:t1PJsVqzER9lYsEmUcqOuC6QtgzVPuBciF:KlliR7Egz9mcY
-
Detect SalatStealer payload
-
Salatstealer family
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops file in System32 directory
-