General

  • Target

    dd4013e77b6d17c884ac9e2099c5bcf09421c624999fcd08ee7321f23a5241ef

  • Size

    11.1MB

  • Sample

    240913-yxcwpawekr

  • MD5

    40083149fa8ce334251ce75ab5ce43d4

  • SHA1

    6f022878978f455becd02b4fabe6e1dce4858234

  • SHA256

    dd4013e77b6d17c884ac9e2099c5bcf09421c624999fcd08ee7321f23a5241ef

  • SHA512

    0e9df95a27c30979454c967e12705490006e4cd5e7d7e5c8c2b4d84ed390bb63a1899f8a6403d7b0f253fceacf3331c34c4602eb90f2c9a6f4c8902871e368de

  • SSDEEP

    196608:51mDWH+XhDVkhSEQoAPmDSiABtyz7a2+0e2zN8j67vg96GcTs36C1ilW44:51mSH+XX7lxgz7aQ3667g6lTs36eilN

Malware Config

Targets

    • Target

      dd4013e77b6d17c884ac9e2099c5bcf09421c624999fcd08ee7321f23a5241ef

    • Size

      11.1MB

    • MD5

      40083149fa8ce334251ce75ab5ce43d4

    • SHA1

      6f022878978f455becd02b4fabe6e1dce4858234

    • SHA256

      dd4013e77b6d17c884ac9e2099c5bcf09421c624999fcd08ee7321f23a5241ef

    • SHA512

      0e9df95a27c30979454c967e12705490006e4cd5e7d7e5c8c2b4d84ed390bb63a1899f8a6403d7b0f253fceacf3331c34c4602eb90f2c9a6f4c8902871e368de

    • SSDEEP

      196608:51mDWH+XhDVkhSEQoAPmDSiABtyz7a2+0e2zN8j67vg96GcTs36C1ilW44:51mSH+XX7lxgz7aQ3667g6lTs36eilN

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks