Analysis
-
max time kernel
103s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 03:30
General
-
Target
2025-04-10_cbc516aed42b2ddc6cde78eb3d1320c1_frostygoop_ghostlocker_knight_luca-stealer_sliver_snatch.exe
-
Size
14.4MB
-
MD5
cbc516aed42b2ddc6cde78eb3d1320c1
-
SHA1
81fd8023f7bf435155e149c52b24a64d404109d5
-
SHA256
f2d04ed7e5f7af46f1323549701b7bf51476c270907ba9722382c6145ad65952
-
SHA512
57963a8eb93ba57066a843a86c8a2eecf6dff1df628616a7440895d9724505e4c105f8bfac90c4fb0a1785dd6a33da5b5f17c6b027d56e937542c1cf306825b5
-
SSDEEP
98304:LzBGO4pkX5qTzgibKOxaIRca2a5+NiGIYHyXWxzgKl0QLXotU9qaXQ7z2MG9n:L34HtK22Va5WeizgKZLbqLXG
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23