General

  • Target

    win32-quickq.exe.v

  • Size

    97.2MB

  • Sample

    240915-llbs2axand

  • MD5

    ae427c7bbe828365a6394f1c50e6c961

  • SHA1

    52e510ac9ac481bf7c4514ef21209a90ffb87975

  • SHA256

    a5aea9f954f9fb2313dd32009415277837f3086979285c92b11346f2b215dece

  • SHA512

    c1812d429f12233342ef5fed4d6b9e6037851e6531b9b9b8aad9b34e406ac6f8da1c88a00986c1832bbb8825974c48c89825bad3eb4f5935862b1aeb0eda7d8d

  • SSDEEP

    3145728:vDMcNdcqY+KZ78neOpjSzsl80+nhzKcP0o:h/wonvezhpMcPN

Malware Config

Targets

    • Target

      win32-quickq.exe.v

    • Size

      97.2MB

    • MD5

      ae427c7bbe828365a6394f1c50e6c961

    • SHA1

      52e510ac9ac481bf7c4514ef21209a90ffb87975

    • SHA256

      a5aea9f954f9fb2313dd32009415277837f3086979285c92b11346f2b215dece

    • SHA512

      c1812d429f12233342ef5fed4d6b9e6037851e6531b9b9b8aad9b34e406ac6f8da1c88a00986c1832bbb8825974c48c89825bad3eb4f5935862b1aeb0eda7d8d

    • SSDEEP

      3145728:vDMcNdcqY+KZ78neOpjSzsl80+nhzKcP0o:h/wonvezhpMcPN

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks