General
-
Target
win32-quickq.exe.v
-
Size
97.2MB
-
Sample
240915-llbs2axand
-
MD5
ae427c7bbe828365a6394f1c50e6c961
-
SHA1
52e510ac9ac481bf7c4514ef21209a90ffb87975
-
SHA256
a5aea9f954f9fb2313dd32009415277837f3086979285c92b11346f2b215dece
-
SHA512
c1812d429f12233342ef5fed4d6b9e6037851e6531b9b9b8aad9b34e406ac6f8da1c88a00986c1832bbb8825974c48c89825bad3eb4f5935862b1aeb0eda7d8d
-
SSDEEP
3145728:vDMcNdcqY+KZ78neOpjSzsl80+nhzKcP0o:h/wonvezhpMcPN
Static task
static1
Behavioral task
behavioral1
Sample
win32-quickq.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
win32-quickq.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
win32-quickq.exe.v
-
Size
97.2MB
-
MD5
ae427c7bbe828365a6394f1c50e6c961
-
SHA1
52e510ac9ac481bf7c4514ef21209a90ffb87975
-
SHA256
a5aea9f954f9fb2313dd32009415277837f3086979285c92b11346f2b215dece
-
SHA512
c1812d429f12233342ef5fed4d6b9e6037851e6531b9b9b8aad9b34e406ac6f8da1c88a00986c1832bbb8825974c48c89825bad3eb4f5935862b1aeb0eda7d8d
-
SSDEEP
3145728:vDMcNdcqY+KZ78neOpjSzsl80+nhzKcP0o:h/wonvezhpMcPN
-
Detect Blackmoon payload
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-