General

  • Target

    42d3f739021157d43f5608db253455463b6d8cc1150d2a7baf81f038a31650c3

  • Size

    11.0MB

  • Sample

    240913-yna1qswdmh

  • MD5

    f3912f8a1495fc0372931b6bb77d0906

  • SHA1

    5371fd9aa587ef833b152b895870d346c5113d3f

  • SHA256

    42d3f739021157d43f5608db253455463b6d8cc1150d2a7baf81f038a31650c3

  • SHA512

    31ea2a07fa16beba63702237a07603eeda122d2f85fc7197e875c954204f510bd7a9f70978424c56d1ef4f7ac14d764d850c7a1504b5985f2154a12169373b90

  • SSDEEP

    196608:wtkBOgSWQdTEsAVwwBpMXF9xxAZle/7GpCFb58bKBe2dsltmvlCxqWPzlbVB0Qef:wtKORTDAnM3U8/+CFbKGB5KtmvlCxlP6

Malware Config

Targets

    • Target

      42d3f739021157d43f5608db253455463b6d8cc1150d2a7baf81f038a31650c3

    • Size

      11.0MB

    • MD5

      f3912f8a1495fc0372931b6bb77d0906

    • SHA1

      5371fd9aa587ef833b152b895870d346c5113d3f

    • SHA256

      42d3f739021157d43f5608db253455463b6d8cc1150d2a7baf81f038a31650c3

    • SHA512

      31ea2a07fa16beba63702237a07603eeda122d2f85fc7197e875c954204f510bd7a9f70978424c56d1ef4f7ac14d764d850c7a1504b5985f2154a12169373b90

    • SSDEEP

      196608:wtkBOgSWQdTEsAVwwBpMXF9xxAZle/7GpCFb58bKBe2dsltmvlCxqWPzlbVB0Qef:wtKORTDAnM3U8/+CFbKGB5KtmvlCxlP6

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks