General

  • Target

    tgee.exe

  • Size

    1.9MB

  • Sample

    220521-n5p6wahggl

  • MD5

    4ce9155d074716d997e7b806312c509b

  • SHA1

    5fab284c13bda7a68237d4a130cac05a8abc465a

  • SHA256

    61d1d245455ca4edd8e676fc53b3801b0e75d7cd73226947d11b97e18faf880e

  • SHA512

    486fa5fc99eae43f1129755b6949cbc8a0a861df0a71985a5b303038857bbf1f3a7efdf6d466a02b1768e43679a8d8bc2da7b90da7e75051165f554e0795c90f

Malware Config

Targets

    • Target

      tgee.exe

    • Size

      1.9MB

    • MD5

      4ce9155d074716d997e7b806312c509b

    • SHA1

      5fab284c13bda7a68237d4a130cac05a8abc465a

    • SHA256

      61d1d245455ca4edd8e676fc53b3801b0e75d7cd73226947d11b97e18faf880e

    • SHA512

      486fa5fc99eae43f1129755b6949cbc8a0a861df0a71985a5b303038857bbf1f3a7efdf6d466a02b1768e43679a8d8bc2da7b90da7e75051165f554e0795c90f

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • suricata: ET MALWARE FatalRAT CnC Activity

      suricata: ET MALWARE FatalRAT CnC Activity

    • Fatal Rat Payload

    • Executes dropped EXE

    • Sets service image path in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks