General

  • Target

    win32-quickq.exe.vir

  • Size

    98.1MB

  • Sample

    240820-rf46aazcnk

  • MD5

    4a61799526b57b38a374e7b6ef20ae9d

  • SHA1

    cc1616b6d27a0e08d5cde707c5c10170672e87f9

  • SHA256

    686426cbf29b0df359b2f3a5ee7c4b765735486d323948e13ad02514592c89b0

  • SHA512

    89e94f1ced69c186b6db7e6f8d85d09c179292e03f6ac281260eb820ae36d19d13b76bd53c1f9dcbb25b4d5f50ceb8decc52e65cb9d27fbba1579d60f205dfe1

  • SSDEEP

    3145728:mbcKVCf/v2Lj8+FOMd+ivrrAOK7bWCtn8qY:mbTPpoMxjrOec8q

Malware Config

Targets

    • Target

      win32-quickq.exe.vir

    • Size

      98.1MB

    • MD5

      4a61799526b57b38a374e7b6ef20ae9d

    • SHA1

      cc1616b6d27a0e08d5cde707c5c10170672e87f9

    • SHA256

      686426cbf29b0df359b2f3a5ee7c4b765735486d323948e13ad02514592c89b0

    • SHA512

      89e94f1ced69c186b6db7e6f8d85d09c179292e03f6ac281260eb820ae36d19d13b76bd53c1f9dcbb25b4d5f50ceb8decc52e65cb9d27fbba1579d60f205dfe1

    • SSDEEP

      3145728:mbcKVCf/v2Lj8+FOMd+ivrrAOK7bWCtn8qY:mbTPpoMxjrOec8q

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks