General
-
Target
10fcac9285f4886bcc99b44ea25dd264ff397e2d488a0e1bc161a950411b9613
-
Size
1.1MB
-
Sample
241212-amcaeatmcx
-
MD5
057da95d1934784ceaaa5b0229538497
-
SHA1
745d0853562bc9cbe964bc100b6cdce18112fdf0
-
SHA256
10fcac9285f4886bcc99b44ea25dd264ff397e2d488a0e1bc161a950411b9613
-
SHA512
505ff79fb6034376de174bb347cc01c2af9bbec9acc270daf41b8945a280dc3d863cb811b3d3f8198bd318d7fbaddf19685cf9a069833c5cdeadaf9ed4ab80ee
-
SSDEEP
24576:8HojlSSKXUne4vmOmU8tpJKI12CiwGo8YyvmWP61TkP6hEW:8H0lSSKX+XvnG/1EPDBvmWPhP4EW
Static task
static1
Behavioral task
behavioral1
Sample
10fcac9285f4886bcc99b44ea25dd264ff397e2d488a0e1bc161a950411b9613.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10fcac9285f4886bcc99b44ea25dd264ff397e2d488a0e1bc161a950411b9613.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
10fcac9285f4886bcc99b44ea25dd264ff397e2d488a0e1bc161a950411b9613
-
Size
1.1MB
-
MD5
057da95d1934784ceaaa5b0229538497
-
SHA1
745d0853562bc9cbe964bc100b6cdce18112fdf0
-
SHA256
10fcac9285f4886bcc99b44ea25dd264ff397e2d488a0e1bc161a950411b9613
-
SHA512
505ff79fb6034376de174bb347cc01c2af9bbec9acc270daf41b8945a280dc3d863cb811b3d3f8198bd318d7fbaddf19685cf9a069833c5cdeadaf9ed4ab80ee
-
SSDEEP
24576:8HojlSSKXUne4vmOmU8tpJKI12CiwGo8YyvmWP61TkP6hEW:8H0lSSKX+XvnG/1EPDBvmWPhP4EW
Score10/10-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatalrat family
-
Fatal Rat payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-