General
-
Target
--¦+-S+d+¿ v74.52.53.msi.vir
-
Size
44.8MB
-
Sample
240728-q1ynkasfka
-
MD5
57744185d11c704fd82216c0e0d4fe7d
-
SHA1
85dbb845cc56669823671540dd80d1316e2a3a7d
-
SHA256
d779ab09eff94933f7f9fc111aee1e06e6f8d8750404e458380a72bbe02ef923
-
SHA512
ade8c5df8515b3b909e7569967e771748ad56e9dcf406437cbef7021c728e8a0bed26c4d749ad010b6b925ae34e103462cf51ce03a098549cd28e939134235a8
-
SSDEEP
786432:zELAPzUv75CFO+GPqDJ3t7q/JVC7jqlinl+ChwwuX1UricetKkI/c7mR6GD:zEOw5iO+GeX+/JVC7jqN/wuXlK5c7mRb
Static task
static1
Behavioral task
behavioral1
Sample
--¦+-S+d+¿ v74.52.53.msi
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
--¦+-S+d+¿ v74.52.53.msi
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
--¦+-S+d+¿ v74.52.53.msi.vir
-
Size
44.8MB
-
MD5
57744185d11c704fd82216c0e0d4fe7d
-
SHA1
85dbb845cc56669823671540dd80d1316e2a3a7d
-
SHA256
d779ab09eff94933f7f9fc111aee1e06e6f8d8750404e458380a72bbe02ef923
-
SHA512
ade8c5df8515b3b909e7569967e771748ad56e9dcf406437cbef7021c728e8a0bed26c4d749ad010b6b925ae34e103462cf51ce03a098549cd28e939134235a8
-
SSDEEP
786432:zELAPzUv75CFO+GPqDJ3t7q/JVC7jqlinl+ChwwuX1UricetKkI/c7mR6GD:zEOw5iO+GeX+/JVC7jqN/wuXlK5c7mRb
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Modifies file permissions
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Component Object Model Hijacking
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Pre-OS Boot
1Bootkit
1