General
-
Target
fb758ef334a36a8ec5a334cfce883b56849cb1ab7e92493074e2adabefcd9b0a
-
Size
140KB
-
Sample
241114-sv716a1cqg
-
MD5
d3501cba07547fc6b1ed36233fd4a5de
-
SHA1
3a0576dee70677db92a1de6b09f29d04e1e743cf
-
SHA256
fb758ef334a36a8ec5a334cfce883b56849cb1ab7e92493074e2adabefcd9b0a
-
SHA512
b878d6ec1ad3679306db10b52895eb7de31ad22a44208c97b327c535987c0a0de221c6aef79f94b45e718c80d840182c3fe6af9ae755429bddb456048ccf9ba0
-
SSDEEP
1536:Vua+BTv3tIO8MtM+/6jRVGIk1MgHjsPGYYwOda2CqqZOIgQJb0lfjtO+vbWL8xJb:Vn+htWMtf+7GZYGVA2QJgi8xJLDoU
Static task
static1
Behavioral task
behavioral1
Sample
fb758ef334a36a8ec5a334cfce883b56849cb1ab7e92493074e2adabefcd9b0a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb758ef334a36a8ec5a334cfce883b56849cb1ab7e92493074e2adabefcd9b0a.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
fb758ef334a36a8ec5a334cfce883b56849cb1ab7e92493074e2adabefcd9b0a
-
Size
140KB
-
MD5
d3501cba07547fc6b1ed36233fd4a5de
-
SHA1
3a0576dee70677db92a1de6b09f29d04e1e743cf
-
SHA256
fb758ef334a36a8ec5a334cfce883b56849cb1ab7e92493074e2adabefcd9b0a
-
SHA512
b878d6ec1ad3679306db10b52895eb7de31ad22a44208c97b327c535987c0a0de221c6aef79f94b45e718c80d840182c3fe6af9ae755429bddb456048ccf9ba0
-
SSDEEP
1536:Vua+BTv3tIO8MtM+/6jRVGIk1MgHjsPGYYwOda2CqqZOIgQJb0lfjtO+vbWL8xJb:Vn+htWMtf+7GZYGVA2QJgi8xJLDoU
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatalrat family
-
Gh0st RAT payload
-
Gh0strat family
-
Fatal Rat payload
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-