General
-
Target
2025-04-20_ceef5ed46adabf633d4475585bc179c3_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch
-
Size
10.3MB
-
Sample
250420-2s9xeaxq12
-
MD5
ceef5ed46adabf633d4475585bc179c3
-
SHA1
b3bcadd9d8c718b8cdcfa5041b4536fd9d40177e
-
SHA256
b7903a40c0e842844a520e7a83dc75afb8a149138fa1f7660ca60b3a2d3446ec
-
SHA512
b39b368f8fefdad0fecaae400acb21542940ae0752eba65fe832993e5c98bdbe806508792b48b9d7ca5812fcba2ff9da9997ad234573e80402d12708858ed682
-
SSDEEP
98304:JweCb+Tm9b6V+eOAyfVracl+A9rUhUheEEbPhhlxa:JrCbMm9QOAyfVWcl5dbEbJ
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-20_ceef5ed46adabf633d4475585bc179c3_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-20_ceef5ed46adabf633d4475585bc179c3_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe
Resource
win11-20250410-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1363515615066980373/T6lkOVEKv7irgU64Lu2XAKyjuMv0154kp6uPvUcuKY5wDPExChNH1WmD9HdAZH2DVB9_
Targets
-
-
Target
2025-04-20_ceef5ed46adabf633d4475585bc179c3_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch
-
Size
10.3MB
-
MD5
ceef5ed46adabf633d4475585bc179c3
-
SHA1
b3bcadd9d8c718b8cdcfa5041b4536fd9d40177e
-
SHA256
b7903a40c0e842844a520e7a83dc75afb8a149138fa1f7660ca60b3a2d3446ec
-
SHA512
b39b368f8fefdad0fecaae400acb21542940ae0752eba65fe832993e5c98bdbe806508792b48b9d7ca5812fcba2ff9da9997ad234573e80402d12708858ed682
-
SSDEEP
98304:JweCb+Tm9b6V+eOAyfVracl+A9rUhUheEEbPhhlxa:JrCbMm9QOAyfVWcl5dbEbJ
Score10/10-
Skuld family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-