General

  • Target

    Fatality.exe

  • Size

    4.3MB

  • Sample

    250329-bz42maxmz9

  • MD5

    87ec8a86c4477f7f07870c2e986a41ac

  • SHA1

    7c29508c83f5f4e2eba74781f90158ac2e6f9c45

  • SHA256

    c6cd7c317902053a4334a142ba9f061161a891ffb01220f486c42019d6ecb117

  • SHA512

    e3c55d3bf6333863d769a1e9277f54b6cf5a1384aea6c4da179092a960aedf5591c7bab480bb909f786758e26784a5acea3cf446ac3a37624b35877ffdacbef7

  • SSDEEP

    98304:nWIpskZHDRgx3iS1U4NewTXlQuT/3Bzi0tbihNuJpQF7:nv5kySZNhzT/JlbINu+7

Malware Config

Targets

    • Target

      Fatality.exe

    • Size

      4.3MB

    • MD5

      87ec8a86c4477f7f07870c2e986a41ac

    • SHA1

      7c29508c83f5f4e2eba74781f90158ac2e6f9c45

    • SHA256

      c6cd7c317902053a4334a142ba9f061161a891ffb01220f486c42019d6ecb117

    • SHA512

      e3c55d3bf6333863d769a1e9277f54b6cf5a1384aea6c4da179092a960aedf5591c7bab480bb909f786758e26784a5acea3cf446ac3a37624b35877ffdacbef7

    • SSDEEP

      98304:nWIpskZHDRgx3iS1U4NewTXlQuT/3Bzi0tbihNuJpQF7:nv5kySZNhzT/JlbINu+7

    • Detect SalatStealer payload

    • Salatstealer family

    • salatstealer

      SalatStealer is a stealer that takes sceenshot written in Golang.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks