General

  • Target

    4bf33d5531fe319bed3d1550608ded652ef6b52437b6cc94d47a0d388f5bb03b.msi

  • Size

    9.5MB

  • Sample

    240718-tq25sawfjn

  • MD5

    8b1b9af08bc62e4608d21b5568c0a581

  • SHA1

    acc808accbb6897da328a1def679b42e198bf9e0

  • SHA256

    4bf33d5531fe319bed3d1550608ded652ef6b52437b6cc94d47a0d388f5bb03b

  • SHA512

    9c03511ccc5c4f1ee386a61e91f9afadc7310d1798a2ba7d233a308fa73dfa260a868c4e30efd92b3259406f645fc50e0449b89aeab8827d32c4c725dd2f971f

  • SSDEEP

    196608:nWxLkNZONFiVDfWpugrukEa3bwQLWnhLQusRQR7p+2+E:nELkNZONFMUFruxoNazsRO7pJt

Malware Config

Targets

    • Target

      4bf33d5531fe319bed3d1550608ded652ef6b52437b6cc94d47a0d388f5bb03b.msi

    • Size

      9.5MB

    • MD5

      8b1b9af08bc62e4608d21b5568c0a581

    • SHA1

      acc808accbb6897da328a1def679b42e198bf9e0

    • SHA256

      4bf33d5531fe319bed3d1550608ded652ef6b52437b6cc94d47a0d388f5bb03b

    • SHA512

      9c03511ccc5c4f1ee386a61e91f9afadc7310d1798a2ba7d233a308fa73dfa260a868c4e30efd92b3259406f645fc50e0449b89aeab8827d32c4c725dd2f971f

    • SSDEEP

      196608:nWxLkNZONFiVDfWpugrukEa3bwQLWnhLQusRQR7p+2+E:nELkNZONFMUFruxoNazsRO7pJt

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks