General

  • Target

    win32-quickq.exe.vir

  • Size

    98.2MB

  • Sample

    240830-q7lbtaydkp

  • MD5

    c68fa72037f40fc601ddca6924121a16

  • SHA1

    696cc89159dbb0113757cd09ec5ffca753e61aff

  • SHA256

    21f418ba6f4a6a28fbed05b057dfb5547be367e10ebc6f15a093a3e5823d7120

  • SHA512

    079020dc1dd8118839143dd0df07c416bcbeacd92a30fee4b82de7be96106e5dbad990a025157b98756a99c36d3c8b8de7be0532ded185b43aa6b8bdd6e4ab32

  • SSDEEP

    3145728:AftiC+brjGIEubtMz8HkjZlpymn98Md4k:dingtXEjNjXd4

Malware Config

Targets

    • Target

      win32-quickq.exe.vir

    • Size

      98.2MB

    • MD5

      c68fa72037f40fc601ddca6924121a16

    • SHA1

      696cc89159dbb0113757cd09ec5ffca753e61aff

    • SHA256

      21f418ba6f4a6a28fbed05b057dfb5547be367e10ebc6f15a093a3e5823d7120

    • SHA512

      079020dc1dd8118839143dd0df07c416bcbeacd92a30fee4b82de7be96106e5dbad990a025157b98756a99c36d3c8b8de7be0532ded185b43aa6b8bdd6e4ab32

    • SSDEEP

      3145728:AftiC+brjGIEubtMz8HkjZlpymn98Md4k:dingtXEjNjXd4

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks