General
-
Target
ad7a268395139d617e3f9485611c4b389eeed6fce31aaf64390a0bd7e4fc7c2e.zip
-
Size
4.3MB
-
Sample
241215-elv4catkh1
-
MD5
f2f416b8c8c01b6dea6c2f75c2c9c290
-
SHA1
8534ece5f26533220f29a052fe2ca016a116c578
-
SHA256
ad7a268395139d617e3f9485611c4b389eeed6fce31aaf64390a0bd7e4fc7c2e
-
SHA512
df6ea4cbc72ac99792b5a2c2bbe6fdb7c0c0d536a26f8c925f0b6e988ffd506c1001c497f1084e5340b70a6a4cd3f4ffc954c42c21e96543526ca21cb03fc65a
-
SSDEEP
98304:ceFm6xWW+lZNKBtgYIH2it67s4w2KIF9FlapFTfCrkYLQoyAx:cew6AXqTZIHpcs4w68+kYEfw
Static task
static1
Behavioral task
behavioral1
Sample
Chrome.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Chrome.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Chrome.exe
-
Size
4.3MB
-
MD5
89385817787b65c1e1efa58c8824c1fa
-
SHA1
e6c72a0f4465c4ebf1b2f27e5b2290e463e3396b
-
SHA256
0a1c860bd4e521605f256224accd99781d8ef4c06bbf8d5c60fd94c360c36930
-
SHA512
6eb258fe9bb111e4fe11265fef2b353bb5cee657ab3f8f6798470c828d437912f91d732d0569cf905bffcba5a4a6014aac718264be92c992d27f1d681b75fb36
-
SSDEEP
98304:/gwRK81kSwPZbAT/B5IXDMLmPG4csKk3hltRJxMxCjQdLGgOxV:/gP8atSDXIXIOG4cGnzQd6f/
-
Blackmoon family
-
Detect Blackmoon payload
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatalrat family
-
Fatal Rat payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-