General

  • Target

    Wps.exe

  • Size

    4.2MB

  • Sample

    230823-eswy8ahf68

  • MD5

    6f5df8e00902ba60401c69463d280ba7

  • SHA1

    7183d6a403bf51a61dbf37196ec9e0b2cb15779d

  • SHA256

    de33644dcb241185d89c7606a8fc7239a274ad277c7b9abf5778736edcb674a9

  • SHA512

    1a0fce1f96235997b8144f5e016050413cd74db2fdc90d9fc2fa30db173a3053e9cc141e88b65624f64c03929d07c9acdd3bacdfc94e406e659023232b7ea386

  • SSDEEP

    98304:n2Jg31PBVygltLW1fvbG05DOyq/FwZ7aujE+tfxe:2Jw1+glta1fvb/NOHwZ3jE+tfc

Malware Config

Targets

    • Target

      Wps.exe

    • Size

      4.2MB

    • MD5

      6f5df8e00902ba60401c69463d280ba7

    • SHA1

      7183d6a403bf51a61dbf37196ec9e0b2cb15779d

    • SHA256

      de33644dcb241185d89c7606a8fc7239a274ad277c7b9abf5778736edcb674a9

    • SHA512

      1a0fce1f96235997b8144f5e016050413cd74db2fdc90d9fc2fa30db173a3053e9cc141e88b65624f64c03929d07c9acdd3bacdfc94e406e659023232b7ea386

    • SSDEEP

      98304:n2Jg31PBVygltLW1fvbG05DOyq/FwZ7aujE+tfxe:2Jw1+glta1fvb/NOHwZ3jE+tfc

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Fatal Rat payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks