Analysis
-
max time kernel
25s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26-02-2023 07:06
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
252KB
-
MD5
a7e66f7ac3d38243c67d4356a3a947b0
-
SHA1
f7e1dbe3c3afcd2b41d75d8a8f8a87edd5c068aa
-
SHA256
37d9f76fb51d49ff8f5d8bd9f04e762a944dc4891d98f2c8db1b38b89795163f
-
SHA512
f4f44236cf546b56b4bbb6965d8a730d30960115cab1bfb4cd7778183bfbafd97fdbb11d245fbffc065bb137c4236268236358a4673160598e308286498a1403
-
SSDEEP
6144:0LeGap/H9gStnws1TAq7HqkDiFeUtoyTt6BjHL/F9B0KYo9EjHL/F9B0KYo9:0LeDf+QVL4eUtoyRuTL/Ff0KYyETL/FV
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 2 IoCs
resource yara_rule behavioral1/memory/1636-54-0x0000000001EF0000-0x0000000001F3E000-memory.dmp fatalrat behavioral1/memory/1636-55-0x0000000010000000-0x0000000010028000-memory.dmp fatalrat -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tmp.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe 1636 tmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1636 tmp.exe