General

  • Target

    6c3540f243e789505d3bcf5e19185b81fc558c626db3d4a4d9affab89df0d444

  • Size

    5.8MB

  • Sample

    231123-fpjedsgh7z

  • MD5

    fc4cd218208f7901d5c462ecd066c57b

  • SHA1

    12fa7c06eefd67ef3bf1e4c4fd12ab80ddddc6b9

  • SHA256

    6c3540f243e789505d3bcf5e19185b81fc558c626db3d4a4d9affab89df0d444

  • SHA512

    7ad501d74a98c5b3c10cae6405dcabcc2242d16263632f637ee2238f4d7dfe5dd9b8a862735525da2d613e3de874dfa69e1a729329560502140954a4bb2567fa

  • SSDEEP

    98304:yQ8ek0Yyc89jX5kvGdxMrG7gGEGT4PWBZsSneAJ:y9NP8h5YN/iHn

Malware Config

Targets

    • Target

      6c3540f243e789505d3bcf5e19185b81fc558c626db3d4a4d9affab89df0d444

    • Size

      5.8MB

    • MD5

      fc4cd218208f7901d5c462ecd066c57b

    • SHA1

      12fa7c06eefd67ef3bf1e4c4fd12ab80ddddc6b9

    • SHA256

      6c3540f243e789505d3bcf5e19185b81fc558c626db3d4a4d9affab89df0d444

    • SHA512

      7ad501d74a98c5b3c10cae6405dcabcc2242d16263632f637ee2238f4d7dfe5dd9b8a862735525da2d613e3de874dfa69e1a729329560502140954a4bb2567fa

    • SSDEEP

      98304:yQ8ek0Yyc89jX5kvGdxMrG7gGEGT4PWBZsSneAJ:y9NP8h5YN/iHn

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks