General

  • Target

    2025-03-31_0fa360268379593d3e9eacc15ee2c91a_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch

  • Size

    7.6MB

  • Sample

    250331-sywsassxgx

  • MD5

    0fa360268379593d3e9eacc15ee2c91a

  • SHA1

    39f01dd0329b2aa9488a1cbc4a3f1f9ddb7e5e34

  • SHA256

    eabef49966f349f3f1eac229d2c1eb7b597e983fad06e1492bb134fbc6892292

  • SHA512

    c24a9314ac9d2ea78e521aa294a02af31ccacb4a8f04b6c449be4e2c0dbc9e8879e65513beff7ecf2b4de317b5e8326a7913f2fa7c0478ffb8c6c943adf3e9b9

  • SSDEEP

    98304:lNFazCM6aEsEByVLBfEn4A1hrTWplm2fVdvB2rwNeH6:l4n6a4UO4A1hQl5XBw6

Malware Config

Targets

    • Target

      2025-03-31_0fa360268379593d3e9eacc15ee2c91a_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch

    • Size

      7.6MB

    • MD5

      0fa360268379593d3e9eacc15ee2c91a

    • SHA1

      39f01dd0329b2aa9488a1cbc4a3f1f9ddb7e5e34

    • SHA256

      eabef49966f349f3f1eac229d2c1eb7b597e983fad06e1492bb134fbc6892292

    • SHA512

      c24a9314ac9d2ea78e521aa294a02af31ccacb4a8f04b6c449be4e2c0dbc9e8879e65513beff7ecf2b4de317b5e8326a7913f2fa7c0478ffb8c6c943adf3e9b9

    • SSDEEP

      98304:lNFazCM6aEsEByVLBfEn4A1hrTWplm2fVdvB2rwNeH6:l4n6a4UO4A1hQl5XBw6

    • Executes dropped EXE

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v15

Tasks