General

  • Target

    fb758ef334a36a8ec5a334cfce883b56849cb1ab7e92493074e2adabefcd9b0a

  • Size

    140KB

  • Sample

    241114-sv716a1cqg

  • MD5

    d3501cba07547fc6b1ed36233fd4a5de

  • SHA1

    3a0576dee70677db92a1de6b09f29d04e1e743cf

  • SHA256

    fb758ef334a36a8ec5a334cfce883b56849cb1ab7e92493074e2adabefcd9b0a

  • SHA512

    b878d6ec1ad3679306db10b52895eb7de31ad22a44208c97b327c535987c0a0de221c6aef79f94b45e718c80d840182c3fe6af9ae755429bddb456048ccf9ba0

  • SSDEEP

    1536:Vua+BTv3tIO8MtM+/6jRVGIk1MgHjsPGYYwOda2CqqZOIgQJb0lfjtO+vbWL8xJb:Vn+htWMtf+7GZYGVA2QJgi8xJLDoU

Malware Config

Targets

    • Target

      fb758ef334a36a8ec5a334cfce883b56849cb1ab7e92493074e2adabefcd9b0a

    • Size

      140KB

    • MD5

      d3501cba07547fc6b1ed36233fd4a5de

    • SHA1

      3a0576dee70677db92a1de6b09f29d04e1e743cf

    • SHA256

      fb758ef334a36a8ec5a334cfce883b56849cb1ab7e92493074e2adabefcd9b0a

    • SHA512

      b878d6ec1ad3679306db10b52895eb7de31ad22a44208c97b327c535987c0a0de221c6aef79f94b45e718c80d840182c3fe6af9ae755429bddb456048ccf9ba0

    • SSDEEP

      1536:Vua+BTv3tIO8MtM+/6jRVGIk1MgHjsPGYYwOda2CqqZOIgQJb0lfjtO+vbWL8xJb:Vn+htWMtf+7GZYGVA2QJgi8xJLDoU

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatalrat family

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Fatal Rat payload

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks