Analysis
-
max time kernel
43s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
17-12-2022 20:09
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp.exe
-
Size
60KB
-
MD5
8e946f74815696883edc7ce2011bf251
-
SHA1
8b3edd2008ce20c3a625223e6df981537580c6ba
-
SHA256
a6845c976c3fdeb0750f291d9f6da7aeb2261d25a3e1839af4c5b16944cbeba7
-
SHA512
4dc55e5a9e79b26ee21fa2d456942e93a1c4b9b0d0239b3610710f2171d850b0c1ddfff077cb8c75f49193c758b10880cdc638a8c6726dda441c18c6d1b51b7c
-
SSDEEP
768:nlPeOQrHVHxeh+wdR11tTWt5fWDC7hP5Y2YW8QijsBIlmqNCt56HikCqMSdbN0zw:nlPeOaVRAPYfWEq6I4mmqLWqMSRN0
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 2 IoCs
resource yara_rule behavioral1/memory/1672-55-0x0000000010000000-0x0000000010028000-memory.dmp fatalrat behavioral1/memory/1672-58-0x0000000001CC0000-0x0000000001D0E000-memory.dmp fatalrat -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tmp.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe 1672 tmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1672 tmp.exe