General
-
Target
WPS-ofcnuirya.msi
-
Size
10.3MB
-
Sample
230731-ehrlradd6y
-
MD5
b65ddbb97577a99e9b965c565ee9ff94
-
SHA1
cf28003a9e4f1e9c0b23744ce9348668d2b83814
-
SHA256
60cba21cb96bb62a49176c2211064df239a6d95a397d0ff9881dad21f9539c67
-
SHA512
03c03e6052c744a2390fa9160577497eb5d88cf8f8d0cb3bc1bf71c11f9be1fdb2ebe74dfdd96dcf209e5e3924bc56c441ab01aaf825d654dae92bf79ff9e0e6
-
SSDEEP
196608:b0wiOFIoq+Ebwp9BJbeGn+mxh6MT1k1uQn:bmG7hJbeANaDn
Static task
static1
Behavioral task
behavioral1
Sample
WPS-ofcnuirya.msi
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
WPS-ofcnuirya.msi
-
Size
10.3MB
-
MD5
b65ddbb97577a99e9b965c565ee9ff94
-
SHA1
cf28003a9e4f1e9c0b23744ce9348668d2b83814
-
SHA256
60cba21cb96bb62a49176c2211064df239a6d95a397d0ff9881dad21f9539c67
-
SHA512
03c03e6052c744a2390fa9160577497eb5d88cf8f8d0cb3bc1bf71c11f9be1fdb2ebe74dfdd96dcf209e5e3924bc56c441ab01aaf825d654dae92bf79ff9e0e6
-
SSDEEP
196608:b0wiOFIoq+Ebwp9BJbeGn+mxh6MT1k1uQn:bmG7hJbeANaDn
Score10/10-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-