General

  • Target

    win32-quickq.exe.vir

  • Size

    96.0MB

  • Sample

    240802-vz3ncasgnm

  • MD5

    606fc12cc525d337db0b39b40bccea8c

  • SHA1

    90a6d3bd5fa1978265388af79c0d3a0abc422dc9

  • SHA256

    a8df35b264cd3e2c067389c5fd001a55fdc06494c581294d8a10ef5fcd75ca31

  • SHA512

    7c3e9882ff50c1fa44b04733d9cfa35fbcec80b1e496c2593d4a439a6286ed49f8a72ad7981fda83b0d70295ea0d8b82580430e0a14386c2d62a15ca0ecf8183

  • SSDEEP

    3145728:gyLpswWSVTt/19AHaVicSDmvmnCFOp31S:HdlPAm9SaPy31

Malware Config

Targets

    • Target

      win32-quickq.exe.vir

    • Size

      96.0MB

    • MD5

      606fc12cc525d337db0b39b40bccea8c

    • SHA1

      90a6d3bd5fa1978265388af79c0d3a0abc422dc9

    • SHA256

      a8df35b264cd3e2c067389c5fd001a55fdc06494c581294d8a10ef5fcd75ca31

    • SHA512

      7c3e9882ff50c1fa44b04733d9cfa35fbcec80b1e496c2593d4a439a6286ed49f8a72ad7981fda83b0d70295ea0d8b82580430e0a14386c2d62a15ca0ecf8183

    • SSDEEP

      3145728:gyLpswWSVTt/19AHaVicSDmvmnCFOp31S:HdlPAm9SaPy31

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks