Behavioral task
behavioral1
Sample
1528-3-0x0000000010000000-0x000000001002A000-memory.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1528-3-0x0000000010000000-0x000000001002A000-memory.dll
Resource
win10v2004-20240709-en
General
-
Target
1528-3-0x0000000010000000-0x000000001002A000-memory.dmp
-
Size
168KB
-
MD5
4771f282d9d961a8e82698112605df6f
-
SHA1
659f2db9ef3c74e92caa1d36137eec3c38d82fb3
-
SHA256
5cc1838e464757cc38b7d5932e2810af385adea888929ce2ee09b8891e4ade33
-
SHA512
35a0e54024c5227b50803d6b4c4d8ef5e545801c525ecaa29a9e831414ea1e03993c69d774108ea7463ddb2ede6d819ee5e529b2d21c48cf3f37e6db8b2e44b9
-
SSDEEP
3072:ZFIlou75k4WvRcdqFfn7N1HGXyyf/dBWrr43tTBf9av9w956frb:7KN75k1NFf7N1HGXyyN0I3tTB41w9wD
Malware Config
Signatures
-
Fatal Rat payload 1 IoCs
resource yara_rule sample fatalrat -
Fatalrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1528-3-0x0000000010000000-0x000000001002A000-memory.dmp
Files
-
1528-3-0x0000000010000000-0x000000001002A000-memory.dmp.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 101KB - Virtual size: 256.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 256.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 256.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 256.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ