General

  • Target

    6b6f99.msi

  • Size

    9.2MB

  • Sample

    240722-w1d7ta1ajg

  • MD5

    99606454c555b45ccf7d94e9ecd73cee

  • SHA1

    5f90e81883ffe92fe903b2150c2690eedc2bbed4

  • SHA256

    9005cc0bc07d213f5691fe31f65b686b6f73a66b1117c2020941c44d53c88df9

  • SHA512

    cbde49abf9744fb0eff5e09439f030caf166f717cb25bda41a361cb020a86abefc7becee1f8dbd8a0977dce328dc606a2e63d6a17ad1deb276b6fd6d2dde92e8

  • SSDEEP

    196608:CWxLkNZONktVDrKfuNL2WO/2eCr4hUQQAcLdu9FtVy7QGO8m:CELkNZONk7r7AW2ichTQTiUg

Malware Config

Targets

    • Target

      6b6f99.msi

    • Size

      9.2MB

    • MD5

      99606454c555b45ccf7d94e9ecd73cee

    • SHA1

      5f90e81883ffe92fe903b2150c2690eedc2bbed4

    • SHA256

      9005cc0bc07d213f5691fe31f65b686b6f73a66b1117c2020941c44d53c88df9

    • SHA512

      cbde49abf9744fb0eff5e09439f030caf166f717cb25bda41a361cb020a86abefc7becee1f8dbd8a0977dce328dc606a2e63d6a17ad1deb276b6fd6d2dde92e8

    • SSDEEP

      196608:CWxLkNZONktVDrKfuNL2WO/2eCr4hUQQAcLdu9FtVy7QGO8m:CELkNZONk7r7AW2ichTQTiUg

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks