General

  • Target

    5ef0131d1445258625224b6ee49268f16bfe03a15f97fd8473b9ecbc38ea802f

  • Size

    10.9MB

  • Sample

    240909-zsjzwazcpn

  • MD5

    b7b3b56cc4868d64951511b2957adc66

  • SHA1

    33a15e22a77d40260248d9e95aad7ae6fb271867

  • SHA256

    5ef0131d1445258625224b6ee49268f16bfe03a15f97fd8473b9ecbc38ea802f

  • SHA512

    218f7e0fd67a7b720286634bf17dbca9085b1b0afec9bb8fe6693448c48b9f4d8ef2e8f9560f961342032c3e0fb15141b9e996319c71f58b9f9c2a285bcfce35

  • SSDEEP

    196608:CTPlhubFtjfiQQBl1t9ucQrsF5GnEyoMWqvfPjaeI1RI01fANYe4:Gui/Bl1CcQrsF5GnEyoMW42eI17FZ

Malware Config

Targets

    • Target

      5ef0131d1445258625224b6ee49268f16bfe03a15f97fd8473b9ecbc38ea802f

    • Size

      10.9MB

    • MD5

      b7b3b56cc4868d64951511b2957adc66

    • SHA1

      33a15e22a77d40260248d9e95aad7ae6fb271867

    • SHA256

      5ef0131d1445258625224b6ee49268f16bfe03a15f97fd8473b9ecbc38ea802f

    • SHA512

      218f7e0fd67a7b720286634bf17dbca9085b1b0afec9bb8fe6693448c48b9f4d8ef2e8f9560f961342032c3e0fb15141b9e996319c71f58b9f9c2a285bcfce35

    • SSDEEP

      196608:CTPlhubFtjfiQQBl1t9ucQrsF5GnEyoMWqvfPjaeI1RI01fANYe4:Gui/Bl1CcQrsF5GnEyoMW42eI17FZ

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks