General

  • Target

    a57e1bcf9538738707f5f6387b72d7bc.exe

  • Size

    292KB

  • Sample

    210110-2lrq6lr4ln

  • MD5

    a57e1bcf9538738707f5f6387b72d7bc

  • SHA1

    839e2f2929292b128f5c71765d15e0b67e19f922

  • SHA256

    bf802ba3e523c502a27e0c9044bc699f0db17ebb00e5b3b9c152038a13c856ed

  • SHA512

    a9a1e3c04f25280f5de47d7a8eebc684481d1b4e05e394127385d2534440f000630e34dd0a22b4ba0870f13abce578b2118fcaf9c41b9f617d920207395e21c8

Score
10/10

Malware Config

Targets

    • Target

      a57e1bcf9538738707f5f6387b72d7bc.exe

    • Size

      292KB

    • MD5

      a57e1bcf9538738707f5f6387b72d7bc

    • SHA1

      839e2f2929292b128f5c71765d15e0b67e19f922

    • SHA256

      bf802ba3e523c502a27e0c9044bc699f0db17ebb00e5b3b9c152038a13c856ed

    • SHA512

      a9a1e3c04f25280f5de47d7a8eebc684481d1b4e05e394127385d2534440f000630e34dd0a22b4ba0870f13abce578b2118fcaf9c41b9f617d920207395e21c8

    Score
    10/10
    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT Payload

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks