General

  • Target

    win32-quickq.exe.vir

  • Size

    98.2MB

  • Sample

    240817-pqbklsycnr

  • MD5

    3eb84526caad8a0db38cc8c6d5daca51

  • SHA1

    d1e87ac3b349ac5ed19d0136e99e31d41b982cf7

  • SHA256

    638a3ff14bd8dee7ee3a9bde0a945d002f123e7854672e6556e1f60af415f4e8

  • SHA512

    2a03b185db2ce3af20e2e42193e11708822f5d9535f7e50d2f487dcc93fd48254d5c8926d88ba04f09414291ee87c9f32d9139f2cc3af479c063618e45fb1404

  • SSDEEP

    3145728:DPkyGNniu0UwmmuflUlDjO1hLNmdwZ6Ec:x3tRuOZjCAM6E

Malware Config

Targets

    • Target

      win32-quickq.exe.vir

    • Size

      98.2MB

    • MD5

      3eb84526caad8a0db38cc8c6d5daca51

    • SHA1

      d1e87ac3b349ac5ed19d0136e99e31d41b982cf7

    • SHA256

      638a3ff14bd8dee7ee3a9bde0a945d002f123e7854672e6556e1f60af415f4e8

    • SHA512

      2a03b185db2ce3af20e2e42193e11708822f5d9535f7e50d2f487dcc93fd48254d5c8926d88ba04f09414291ee87c9f32d9139f2cc3af479c063618e45fb1404

    • SSDEEP

      3145728:DPkyGNniu0UwmmuflUlDjO1hLNmdwZ6Ec:x3tRuOZjCAM6E

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks