General

  • Target

    win32-quickq.exe.v

  • Size

    97.6MB

  • Sample

    240920-k2v16sydqa

  • MD5

    c9af3d48d25d3df466fe41c40bf1f1c3

  • SHA1

    515d1d06163d8a9466ae9e2c5bfc621b08e00cc4

  • SHA256

    7017d08b045c35306e20675850eb40dcef6c3d5a4b2cbefe30eddb613ba9580e

  • SHA512

    afeba24477cd741622485f67b3c810e23feae3ad3eae0d3f2a9853ef7fc0f65dd94a2febda09265751fc6949503065181b727aeb01bc344980d82d876d43958d

  • SSDEEP

    3145728:NavhTKlk5M0b76BS3W35ddwwbo1174rlM+t6j:N0XXs6WH2wKaO+tW

Malware Config

Targets

    • Target

      win32-quickq.exe.v

    • Size

      97.6MB

    • MD5

      c9af3d48d25d3df466fe41c40bf1f1c3

    • SHA1

      515d1d06163d8a9466ae9e2c5bfc621b08e00cc4

    • SHA256

      7017d08b045c35306e20675850eb40dcef6c3d5a4b2cbefe30eddb613ba9580e

    • SHA512

      afeba24477cd741622485f67b3c810e23feae3ad3eae0d3f2a9853ef7fc0f65dd94a2febda09265751fc6949503065181b727aeb01bc344980d82d876d43958d

    • SSDEEP

      3145728:NavhTKlk5M0b76BS3W35ddwwbo1174rlM+t6j:N0XXs6WH2wKaO+tW

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Fatal Rat payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks