General

  • Target

    9e61eb2d2be564e1cf08562eddd1ceb4988386f2b6d91602593eeb52cc81af71.exe.vir

  • Size

    17.8MB

  • Sample

    241119-kljcfatcnk

  • MD5

    b85f7835e737e11d4b8ad8029e06f0d9

  • SHA1

    e0e587a3c4e99e7a810996dc355008d94d5f0f82

  • SHA256

    9e61eb2d2be564e1cf08562eddd1ceb4988386f2b6d91602593eeb52cc81af71

  • SHA512

    51c4960e477853c28bda3f1e94dbdf4d565ff36e8bf7b7443f79d3e70de34d62057d275a7eac409d7f1db7c4936c4033de87329a19da83a6f3f62513b5ee82c5

  • SSDEEP

    393216:dfyt/Ya80GUH+sz6LXXKSGiY4mr8+qcyDuenhsXmRAEgjv0wOsAjrJ:UY30GUegy1A8hZSeK2RAEgOs6rJ

Malware Config

Targets

    • Target

      9e61eb2d2be564e1cf08562eddd1ceb4988386f2b6d91602593eeb52cc81af71.exe.vir

    • Size

      17.8MB

    • MD5

      b85f7835e737e11d4b8ad8029e06f0d9

    • SHA1

      e0e587a3c4e99e7a810996dc355008d94d5f0f82

    • SHA256

      9e61eb2d2be564e1cf08562eddd1ceb4988386f2b6d91602593eeb52cc81af71

    • SHA512

      51c4960e477853c28bda3f1e94dbdf4d565ff36e8bf7b7443f79d3e70de34d62057d275a7eac409d7f1db7c4936c4033de87329a19da83a6f3f62513b5ee82c5

    • SSDEEP

      393216:dfyt/Ya80GUH+sz6LXXKSGiY4mr8+qcyDuenhsXmRAEgjv0wOsAjrJ:UY30GUegy1A8hZSeK2RAEgOs6rJ

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatalrat family

    • Fatal Rat payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks