General
-
Target
2025-05-08_85bc7f02cec175bea7e72b93823725ca_frostygoop_hijackloader_knight_luca-stealer_poet-rat_sliver_snatch
-
Size
9.4MB
-
Sample
250508-nrsd3ssrz8
-
MD5
85bc7f02cec175bea7e72b93823725ca
-
SHA1
553e10db2546ac14af83c2867f26df42cf8e3c9c
-
SHA256
49c3626b86a498a0346f3cac6ea95a9e320a5cbeca75491ff6fd64ea12b5211b
-
SHA512
384d9b504b2a8becda50b12ce4b15b9b17bf894bed9e4344a7d98c8238e97e19b63f0abbea17e36ba12d0ac12b4dac30b242ec52f83fe98bf8504d92372dd34e
-
SSDEEP
196608:GhvYp8xv9NID47mF49WPNcLXko2Vx/6eg:GhC8VYs7mu9iqbkoy/E
Static task
static1
Behavioral task
behavioral1
Sample
2025-05-08_85bc7f02cec175bea7e72b93823725ca_frostygoop_hijackloader_knight_luca-stealer_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
2025-05-08_85bc7f02cec175bea7e72b93823725ca_frostygoop_hijackloader_knight_luca-stealer_poet-rat_sliver_snatch.exe
Resource
win11-20250502-en
Malware Config
Extracted
lumma
https://improvxf.run/kobe
https://voznessxyy.life/bnaz
https://insidegrah.run/ieop
https://homewappzb.top/tqba
https://clatteqrpq.digital/kljz
https://descenrugb.bet/woap
https://grizzlqzuk.live/qhbu
https://ninepicchf.bet/lznd
https://snakejh.top/adsk
Targets
-
-
Target
2025-05-08_85bc7f02cec175bea7e72b93823725ca_frostygoop_hijackloader_knight_luca-stealer_poet-rat_sliver_snatch
-
Size
9.4MB
-
MD5
85bc7f02cec175bea7e72b93823725ca
-
SHA1
553e10db2546ac14af83c2867f26df42cf8e3c9c
-
SHA256
49c3626b86a498a0346f3cac6ea95a9e320a5cbeca75491ff6fd64ea12b5211b
-
SHA512
384d9b504b2a8becda50b12ce4b15b9b17bf894bed9e4344a7d98c8238e97e19b63f0abbea17e36ba12d0ac12b4dac30b242ec52f83fe98bf8504d92372dd34e
-
SSDEEP
196608:GhvYp8xv9NID47mF49WPNcLXko2Vx/6eg:GhC8VYs7mu9iqbkoy/E
Score10/10-
Lumma family
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1