12
返回列表 发新帖
楼主: ジ蓅暒划过づ
收起左侧

[病毒样本] VT4 FatalRAT1x

[复制链接]
Nocria
发表于 2025-3-25 12:25:36 | 显示全部楼层
本帖最后由 Nocria 于 2025-3-25 12:32 编辑
zfc234 发表于 2025-3-25 09:14
想咨询一下VES是个人购买的还是企业买的呀?有渠道吗?谢谢

我是在官网买的 VES (VIPRE Endpoint Security Cloud) 一席位版本
https://vipre.com/products/endpoint-security/endpoint-solutions/
需要注意的是没有中文版

评分

参与人数 1人气 +3 收起 理由
zfc234 + 3 感谢解答: )

查看全部评分

电脑发烧迷
发表于 2025-3-25 17:15:34 | 显示全部楼层
360 miss ,红伞kill

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
Fadouse
发表于 2025-3-25 17:56:44 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
吃瓜群众第123位
发表于 2025-3-25 19:44:23 | 显示全部楼层
FSP KILL

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
chx818
发表于 2025-3-25 19:56:11 | 显示全部楼层
elastic security 执行后被击杀,并产生了一堆告警


基于Grok2的Attack Discovery:
Summary
Critical security incident on

desktop-c2asff2
involving
FatalRAT.exe
executed by

chx818
with shellcode injection and unbacked shellcode from an unsigned module.

Details
On

desktop-c2asff2
, a critical security incident was detected involving the execution of
FatalRAT.exe
by

chx818
. The attack began at
2025-03-25T11:43:38.481Z
and involved multiple alerts related to shellcode injection and unbacked shellcode from an unsigned module. The process
C:\Users\chx818\Downloads\FatalRAT\FatalRAT.exe
was executed with high integrity level, indicating a potential privilege escalation attempt. The malware used defense evasion tactics, specifically process injection (T1055), to hide its activities. The absence of a code signature and the use of shellcode suggest a sophisticated attack, possibly linked to known threat groups like Pikabot or Latrodectus, as referenced in the alerts. The attack progression likely involved:

Initial Execution:

chx818
executed
FatalRAT.exe
from a downloaded location.
Privilege Escalation: The process ran with a high integrity level, suggesting an attempt to gain elevated permissions.
Defense Evasion: The use of shellcode injection and unbacked shellcode from an unsigned module indicates efforts to evade detection.
Persistence: The malware may have attempted to establish persistence on the system, though this was not directly observed in the alerts.

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
biue
发表于 2025-3-25 23:12:47 | 显示全部楼层
腾讯电脑管家 1X

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-9 09:57 , Processed in 0.085200 second(s), 15 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表