General

  • Target

    win32-quickq.exe.vir

  • Size

    98.2MB

  • Sample

    240822-bgr94szgpf

  • MD5

    dda2dfcf13f24ce51724ec41095e1a87

  • SHA1

    2727eaae437bc3c91b2003512aa68755fa4cdf41

  • SHA256

    cb8c006e792d114fc933a7afa50aedf9acd704b43603309af9d57a037d8d22c3

  • SHA512

    603a1a4ada5b1827fbd0b311cf76421625d1aae32879cdaf93753bc896e9752d1fa4b31787c40f935b0384578ac1f62537e5b4d2756d600ca17145c7c5476611

  • SSDEEP

    3145728:Rm4KqV66vOhH3wp9skecmKopLbeszNnFw:hGxgpnZmxGonF

Malware Config

Targets

    • Target

      win32-quickq.exe.vir

    • Size

      98.2MB

    • MD5

      dda2dfcf13f24ce51724ec41095e1a87

    • SHA1

      2727eaae437bc3c91b2003512aa68755fa4cdf41

    • SHA256

      cb8c006e792d114fc933a7afa50aedf9acd704b43603309af9d57a037d8d22c3

    • SHA512

      603a1a4ada5b1827fbd0b311cf76421625d1aae32879cdaf93753bc896e9752d1fa4b31787c40f935b0384578ac1f62537e5b4d2756d600ca17145c7c5476611

    • SSDEEP

      3145728:Rm4KqV66vOhH3wp9skecmKopLbeszNnFw:hGxgpnZmxGonF

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks