Analysis
-
max time kernel
31s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24-02-2023 13:14
Static task
static1
Behavioral task
behavioral1
Sample
0c8e32a34170af448356f488bccedec6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0c8e32a34170af448356f488bccedec6.exe
Resource
win10v2004-20230220-en
General
-
Target
0c8e32a34170af448356f488bccedec6.exe
-
Size
116KB
-
MD5
0c8e32a34170af448356f488bccedec6
-
SHA1
038b2e086a4b6b1e28caf7e31c387c497d20ec64
-
SHA256
af7ba44606b943ddb885c2a225e5e91c17cd15c8ca7f26ac90e7331c3f4094d2
-
SHA512
bbfe3fb556f5e4795230708d376fb85984439969c66212cdb43297688f02dfcd53f3f5c3c1bd25a51949cbd90e2a33a139a09bdcfc327973735c23147cc4552e
-
SSDEEP
1536:KcYjZ58N+dx6vZxODUCTz3r6QLd316rQUFb7cIo2QTNf256dIJ4XF:KcYjH8oayZ31Ab7+NC4XF
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 2 IoCs
resource yara_rule behavioral1/memory/912-54-0x0000000000420000-0x000000000046E000-memory.dmp fatalrat behavioral1/memory/912-55-0x0000000010000000-0x0000000010028000-memory.dmp fatalrat -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 0c8e32a34170af448356f488bccedec6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 0c8e32a34170af448356f488bccedec6.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe 912 0c8e32a34170af448356f488bccedec6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 912 0c8e32a34170af448356f488bccedec6.exe