General
-
Target
d5f1a67929e16bc93f8f1b889bfa38fdf4236391319b2fc9682aff365124cc2b
-
Size
3.5MB
-
Sample
240910-e92wssxckk
-
MD5
5ade654e7a7ec8bf2d39d3fc93347e36
-
SHA1
166cad52099199c90d1f60cfbcb06c3ac5c771a8
-
SHA256
d5f1a67929e16bc93f8f1b889bfa38fdf4236391319b2fc9682aff365124cc2b
-
SHA512
f94094e15d8ed2e5af115a21f4fd79adef3bfb0fcd392c15d1034e69cd662a443fe94fd3064eca28208cae5aec923c94cfef7d44f48a8375cd8d882799d3196d
-
SSDEEP
98304:P0e6mnKhq9X8sAicJFvl6zG6lzhZgGx3RPboGmDNiMdS:PB6B4X8b3FV6lzzgGDfmDNY
Static task
static1
Behavioral task
behavioral1
Sample
uyd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
uyd.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
uyd.exe
-
Size
5.6MB
-
MD5
2295488c4b91a2e19e098945b5d52bf7
-
SHA1
2b2c51cf640e158b9a811bb520e1d5f0844ea021
-
SHA256
41bd610f99dfe3d52e864906ea891f2df5f4072726591697bfc678bfa26ecd69
-
SHA512
b47bab5f79d64eaaa6dea25cc6d69dc1aca6fd8ca39dc7813660eb20df2d592fdbf28b8671e01a0f0cbc388ed638aae397bbe056a926cc1dda8d0ff8611e02a4
-
SSDEEP
98304:JJIK4qnhD6HBnpg5negdwSfeP6cBMGZ7lo+H3FtoqFZojg1:JJIKtmpg9ASfeP6ceYH3FtoqFOQ
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-