General
-
Target
6c3540f243e789505d3bcf5e19185b81fc558c626db3d4a4d9affab89df0d444
-
Size
5.8MB
-
Sample
231123-fpjedsgh7z
-
MD5
fc4cd218208f7901d5c462ecd066c57b
-
SHA1
12fa7c06eefd67ef3bf1e4c4fd12ab80ddddc6b9
-
SHA256
6c3540f243e789505d3bcf5e19185b81fc558c626db3d4a4d9affab89df0d444
-
SHA512
7ad501d74a98c5b3c10cae6405dcabcc2242d16263632f637ee2238f4d7dfe5dd9b8a862735525da2d613e3de874dfa69e1a729329560502140954a4bb2567fa
-
SSDEEP
98304:yQ8ek0Yyc89jX5kvGdxMrG7gGEGT4PWBZsSneAJ:y9NP8h5YN/iHn
Behavioral task
behavioral1
Sample
6c3540f243e789505d3bcf5e19185b81fc558c626db3d4a4d9affab89df0d444.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
6c3540f243e789505d3bcf5e19185b81fc558c626db3d4a4d9affab89df0d444.exe
Resource
win10v2004-20231023-en
Malware Config
Targets
-
-
Target
6c3540f243e789505d3bcf5e19185b81fc558c626db3d4a4d9affab89df0d444
-
Size
5.8MB
-
MD5
fc4cd218208f7901d5c462ecd066c57b
-
SHA1
12fa7c06eefd67ef3bf1e4c4fd12ab80ddddc6b9
-
SHA256
6c3540f243e789505d3bcf5e19185b81fc558c626db3d4a4d9affab89df0d444
-
SHA512
7ad501d74a98c5b3c10cae6405dcabcc2242d16263632f637ee2238f4d7dfe5dd9b8a862735525da2d613e3de874dfa69e1a729329560502140954a4bb2567fa
-
SSDEEP
98304:yQ8ek0Yyc89jX5kvGdxMrG7gGEGT4PWBZsSneAJ:y9NP8h5YN/iHn
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-