General

  • Target

    7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0

  • Size

    532KB

  • Sample

    231107-seaeysah9t

  • MD5

    19f228f2b03012748f224bb8bb7b4982

  • SHA1

    410bb016e57d520928c90ebea855569ea3f2bd9d

  • SHA256

    7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0

  • SHA512

    8319cae9045714e508928391f331597a8e7531dd11874478fd5c1d7da68849f94695f84e9322f350b9d3ce936e4432f59e4abc195fddc16b12014a24dc6cc9b0

  • SSDEEP

    12288:9ZrM7Q5qzwjlEMbT7RwwWKpPu7uLXZBmA1:z4k5ucEM/2wWYaepV

Malware Config

Targets

    • Target

      7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0

    • Size

      532KB

    • MD5

      19f228f2b03012748f224bb8bb7b4982

    • SHA1

      410bb016e57d520928c90ebea855569ea3f2bd9d

    • SHA256

      7f39379d5a00823230db97e51a97994ba7eb7e653f70d5db7fdea809640bfbc0

    • SHA512

      8319cae9045714e508928391f331597a8e7531dd11874478fd5c1d7da68849f94695f84e9322f350b9d3ce936e4432f59e4abc195fddc16b12014a24dc6cc9b0

    • SSDEEP

      12288:9ZrM7Q5qzwjlEMbT7RwwWKpPu7uLXZBmA1:z4k5ucEM/2wWYaepV

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks