General

  • Target

    Fatality.exe

  • Size

    3.2MB

  • Sample

    250330-fj129azzgw

  • MD5

    314375a212ba4f9038c454820d9c5cad

  • SHA1

    2ce6451c052f88a9c0bddad5f23bc3253cb972bd

  • SHA256

    003ace97463c139fb1d6c53909c5dac9ffd958a698330a817bc268e6131182c5

  • SHA512

    31dcee114b402cded2bcc1f0589963b835e97dd9b2d173aad2ddf1afd72874e335f75bd2d08d2c14ef90334f4d7d01fe0830503479292e7b1d6938c2781eeaf8

  • SSDEEP

    98304:dSSniwJ8BPhwpzMda5oyqo7UrstRTJjyPv+I:8+WwpzMw5zqo7UrsDt2PH

Malware Config

Targets

    • Target

      Fatality.exe

    • Size

      3.2MB

    • MD5

      314375a212ba4f9038c454820d9c5cad

    • SHA1

      2ce6451c052f88a9c0bddad5f23bc3253cb972bd

    • SHA256

      003ace97463c139fb1d6c53909c5dac9ffd958a698330a817bc268e6131182c5

    • SHA512

      31dcee114b402cded2bcc1f0589963b835e97dd9b2d173aad2ddf1afd72874e335f75bd2d08d2c14ef90334f4d7d01fe0830503479292e7b1d6938c2781eeaf8

    • SSDEEP

      98304:dSSniwJ8BPhwpzMda5oyqo7UrstRTJjyPv+I:8+WwpzMw5zqo7UrsDt2PH

    • Detect SalatStealer payload

    • Modifies visiblity of hidden/system files in Explorer

    • Salatstealer family

    • salatstealer

      SalatStealer is a stealer that takes sceenshot written in Golang.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks