MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ba51980ef9681d849c9331e891cc411c1687d3c011f0acc01da9f4ef640764b6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



YoungLotus


Vendor detections: 16


Intelligence 16 IOCs YARA 15 File information Comments

SHA256 hash: ba51980ef9681d849c9331e891cc411c1687d3c011f0acc01da9f4ef640764b6
SHA3-384 hash: 8af79e7df3621ae534711a887684bc5fb7075d1910b6b108cab6ed55d726a6ecabacab5c1032da98ed89f85b95ffe764
SHA1 hash: 43b0c03b176318ce2551d3dfc2c18e18f53c2240
MD5 hash: 4ce1a842d3d770f6fa4b4167542408b2
humanhash: lake-summer-avocado-california
File name:svchost.exe
Download: download sample
Signature YoungLotus
File size:3'497'984 bytes
First seen:2025-02-21 22:55:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9b201090749bae06a761156dbad9c4f1 (8 x FatalRAT, 5 x YoungLotus)
ssdeep 98304:ltUF8r/8jZ4aVf1qFtcbiWhYQUpvnXqp83C:PUF8iZ4qf1qFty3SV1nXY8
TLSH T158F5237B92790246E9F9CC35C527BEA436FA52670E02683045DAF9C529336F4B702E63
TrID 47.1% (.EXE) Win32 Executable MS Visual C++ 5.0 (60687/85)
24.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
8.1% (.EXE) Win64 Executable (generic) (10522/11/4)
5.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
Reporter aachum
Tags:exe FatalRAT younglotus


Avatar
iamaachum
FatalRAT C2:
a17.nbdsnb2.top
a17.yydsnb1.top

Intelligence


File Origin
# of uploads :
1
# of downloads :
50
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
fatalrat
ID:
1
File name:
ba51980ef9681d849c9331e891cc411c1687d3c011f0acc01da9f4ef640764b6
Verdict:
Malicious activity
Analysis date:
2025-02-12 22:23:24 UTC
Tags:
fatalrat rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
phishing emotet ghost
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Connection attempt to an infection source
Query of malicious DNS domain
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
cmd crypt explorer lolbin obfuscated obfuscated packed packed packer_detected vmprotect
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
88 / 100
Signature
Antivirus / Scanner detection for submitted sample
Creates an undocumented autostart registry key
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for submitted file
Opens the same file many times (likely Sandbox evasion)
Sigma detected: System File Execution Location Anomaly
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.GhostRAT
Status:
Malicious
First seen:
2025-02-12 22:23:25 UTC
File Type:
PE (Exe)
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Result
Malware family:
fatalrat
Score:
  10/10
Tags:
family:fatalrat discovery infostealer rat stealer trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
System Location Discovery: System Language Discovery
Fatal Rat payload
FatalRat
Fatalrat family
Verdict:
Malicious
Tags:
Win.Malware.Beforhkb-10038469-0 fatalrat
YARA:
n/a
Unpacked files
SH256 hash:
ba51980ef9681d849c9331e891cc411c1687d3c011f0acc01da9f4ef640764b6
MD5 hash:
4ce1a842d3d770f6fa4b4167542408b2
SHA1 hash:
43b0c03b176318ce2551d3dfc2c18e18f53c2240
SH256 hash:
51026cfab1f4f234d284d7041ce24e727af259bd9bcec8f3977eaa3a22b7b6f7
MD5 hash:
994c43620085054ecc86dbfe1afb3d95
SHA1 hash:
5d7aee3743f55df1b289991f5aa5e1899546b906
Detections:
win_fatal_rat_w0 win_younglotus_g0 INDICATOR_SUSPICIOUS_EXE_ClearMyTracksByProcess MALWARE_Win_FatalRAT
SH256 hash:
e13eab442fb20b0b47df9d50f3d8a725056420aa71514d754c154fda27bb8cec
MD5 hash:
83ae5bdb5256806c248703c7898dd8df
SHA1 hash:
4490ad36e6d7ec537bbbeef4cd344f17e1de82ad
Detections:
win_fatal_rat_w0 win_younglotus_g0 win_fatal_rat_auto INDICATOR_SUSPICIOUS_EXE_ClearMyTracksByProcess MALWARE_Win_FatalRAT
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Armadillov1xxv2xx
Author:malware-lu
Rule name:Check_DriveSize
Rule name:Check_OutputDebugStringA_iat
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:INDICATOR_SUSPICIOUS_EXE_ClearMyTracksByProcess
Author:ditekSHen
Description:Detects executables calling ClearMyTracksByProcess
Rule name:MALWARE_Win_FatalRAT
Author:ditekSHen
Description:Detects FatalRAT
Rule name:NET
Author:malware-lu
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:win32_younglotus
Author:Reedus0
Description:Rule for detecting YoungLotus malware
Rule name:Windows_Generic_Threat_7693d7fd
Author:Elastic Security
Rule name:win_fatal_rat_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.fatal_rat.
Rule name:win_fatal_rat_w0
Author:AT&T Alien Labs
Description:Detects FatalRAT, unpacked malware.
Reference:https://cybersecurity.att.com/blogs/labs-research/new-sophisticated-rat-in-town-fatalrat-analysis

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

YoungLotus

Executable exe ba51980ef9681d849c9331e891cc411c1687d3c011f0acc01da9f4ef640764b6

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA

Comments