General

  • Target

    d5f1a67929e16bc93f8f1b889bfa38fdf4236391319b2fc9682aff365124cc2b

  • Size

    3.5MB

  • Sample

    240910-e92wssxckk

  • MD5

    5ade654e7a7ec8bf2d39d3fc93347e36

  • SHA1

    166cad52099199c90d1f60cfbcb06c3ac5c771a8

  • SHA256

    d5f1a67929e16bc93f8f1b889bfa38fdf4236391319b2fc9682aff365124cc2b

  • SHA512

    f94094e15d8ed2e5af115a21f4fd79adef3bfb0fcd392c15d1034e69cd662a443fe94fd3064eca28208cae5aec923c94cfef7d44f48a8375cd8d882799d3196d

  • SSDEEP

    98304:P0e6mnKhq9X8sAicJFvl6zG6lzhZgGx3RPboGmDNiMdS:PB6B4X8b3FV6lzzgGDfmDNY

Malware Config

Targets

    • Target

      uyd.exe

    • Size

      5.6MB

    • MD5

      2295488c4b91a2e19e098945b5d52bf7

    • SHA1

      2b2c51cf640e158b9a811bb520e1d5f0844ea021

    • SHA256

      41bd610f99dfe3d52e864906ea891f2df5f4072726591697bfc678bfa26ecd69

    • SHA512

      b47bab5f79d64eaaa6dea25cc6d69dc1aca6fd8ca39dc7813660eb20df2d592fdbf28b8671e01a0f0cbc388ed638aae397bbe056a926cc1dda8d0ff8611e02a4

    • SSDEEP

      98304:JJIK4qnhD6HBnpg5negdwSfeP6cBMGZ7lo+H3FtoqFZojg1:JJIKtmpg9ASfeP6ceYH3FtoqFOQ

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks