General

  • Target

    win32-quickq.exe.vir

  • Size

    98.4MB

  • Sample

    240827-b6ckysyckm

  • MD5

    c028100fb9293d48776f844b7fa4cd34

  • SHA1

    0322a89a7b8347b895c03580128686b182d68439

  • SHA256

    c058b5fe7f3524cdbf1ea83fe145f288572201835a06119d08dd98016447977e

  • SHA512

    1429afe2544c9cb70b853b1a75a9c02c11a349b6aa2ab8196e027aeff0c3c44750ed2a573429b121f31537f4b33a20f50acdfd763357d8abee261a128e34d53d

  • SSDEEP

    3145728:QedJqralK+HWng0EembYlXpe1CvMnrWxcSn:T2g/elNpVa0cS

Malware Config

Targets

    • Target

      win32-quickq.exe.vir

    • Size

      98.4MB

    • MD5

      c028100fb9293d48776f844b7fa4cd34

    • SHA1

      0322a89a7b8347b895c03580128686b182d68439

    • SHA256

      c058b5fe7f3524cdbf1ea83fe145f288572201835a06119d08dd98016447977e

    • SHA512

      1429afe2544c9cb70b853b1a75a9c02c11a349b6aa2ab8196e027aeff0c3c44750ed2a573429b121f31537f4b33a20f50acdfd763357d8abee261a128e34d53d

    • SSDEEP

      3145728:QedJqralK+HWng0EembYlXpe1CvMnrWxcSn:T2g/elNpVa0cS

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks