General
-
Target
0fc9b32ce3d413281569d019f0d9cd712224ca7d8a8a375bfea881335142093a
-
Size
252KB
-
Sample
230908-132hcafg23
-
MD5
e7b77f9ccca4b2438c87def415421e55
-
SHA1
204fd901dbdd3723e54019805edfd18dd277f3c2
-
SHA256
0fc9b32ce3d413281569d019f0d9cd712224ca7d8a8a375bfea881335142093a
-
SHA512
c49c4c44dbfec33749d49ef4d4665f197c05a524bd2d69574934c575f83cfc53ce41618908e5efee844e61e62ae0e5840f0cb188dd60feb07597142f3937bdf7
-
SSDEEP
6144:2euZGKBb+7wacDG+lACeGD4weCPjkafVWcTKGev7Z:vu0Y+7lcC+lMV7CXk0KGeTZ
Behavioral task
behavioral1
Sample
0fc9b32ce3d413281569d019f0d9cd712224ca7d8a8a375bfea881335142093a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0fc9b32ce3d413281569d019f0d9cd712224ca7d8a8a375bfea881335142093a.exe
Resource
win10v2004-20230831-en
Malware Config
Targets
-
-
Target
0fc9b32ce3d413281569d019f0d9cd712224ca7d8a8a375bfea881335142093a
-
Size
252KB
-
MD5
e7b77f9ccca4b2438c87def415421e55
-
SHA1
204fd901dbdd3723e54019805edfd18dd277f3c2
-
SHA256
0fc9b32ce3d413281569d019f0d9cd712224ca7d8a8a375bfea881335142093a
-
SHA512
c49c4c44dbfec33749d49ef4d4665f197c05a524bd2d69574934c575f83cfc53ce41618908e5efee844e61e62ae0e5840f0cb188dd60feb07597142f3937bdf7
-
SSDEEP
6144:2euZGKBb+7wacDG+lACeGD4weCPjkafVWcTKGev7Z:vu0Y+7lcC+lMV7CXk0KGeTZ
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-