General
-
Target
5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9
-
Size
4.6MB
-
Sample
230926-fb4heaef4w
-
MD5
bf7e11ba2252db0e6be3c31b137b12dc
-
SHA1
2ff198c59fe7be2c807816fa243e9c874f85b388
-
SHA256
5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9
-
SHA512
aa0493ba6ff5ebd4cfede6fa3fcb29cf00721b44acbd4eb5a65ef11a5e3930ea90aa8726790189f7866bbe4ed67ade81154a37a38063966f663d5d81050fc1ad
-
SSDEEP
49152:TbEp2+CVgtJO94vM0iTnDJJZk425V/zaBM3SbawwtlY6sKpETPub0J0lTuRjlH6H:TJnVivMba4aBN3SbAYbKpEq0WMRh
Static task
static1
Behavioral task
behavioral1
Sample
5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9
-
Size
4.6MB
-
MD5
bf7e11ba2252db0e6be3c31b137b12dc
-
SHA1
2ff198c59fe7be2c807816fa243e9c874f85b388
-
SHA256
5726447d808719aaad889259c482641ae4583e8ac7e16de1688c00425f9935b9
-
SHA512
aa0493ba6ff5ebd4cfede6fa3fcb29cf00721b44acbd4eb5a65ef11a5e3930ea90aa8726790189f7866bbe4ed67ade81154a37a38063966f663d5d81050fc1ad
-
SSDEEP
49152:TbEp2+CVgtJO94vM0iTnDJJZk425V/zaBM3SbawwtlY6sKpETPub0J0lTuRjlH6H:TJnVivMba4aBN3SbAYbKpEq0WMRh
Score10/10-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-