General
-
Target
184be2a73a16e66153a8af6958c16b9d
-
Size
905KB
-
Sample
220610-apgb5sdfeq
-
MD5
184be2a73a16e66153a8af6958c16b9d
-
SHA1
119957a445db96c9e151a326c535fe36c70adda7
-
SHA256
9e9eae41469ebcfc9d59edafcb66c6f2eed5850c06d0306f4a1cc3eb47afc85e
-
SHA512
3682b333ff8f0e759467929b2f564ebdc1735f4ed42d3a59ac4e5dd1f9492f024ee361b390df66421535c45c157da137206eeb7d6376684c2322b8e73e2d074a
Static task
static1
Behavioral task
behavioral1
Sample
184be2a73a16e66153a8af6958c16b9d.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
184be2a73a16e66153a8af6958c16b9d
-
Size
905KB
-
MD5
184be2a73a16e66153a8af6958c16b9d
-
SHA1
119957a445db96c9e151a326c535fe36c70adda7
-
SHA256
9e9eae41469ebcfc9d59edafcb66c6f2eed5850c06d0306f4a1cc3eb47afc85e
-
SHA512
3682b333ff8f0e759467929b2f564ebdc1735f4ed42d3a59ac4e5dd1f9492f024ee361b390df66421535c45c157da137206eeb7d6376684c2322b8e73e2d074a
-
SectopRAT Payload
-
suricata: ET MALWARE Arechclient2 Backdoor CnC Init
suricata: ET MALWARE Arechclient2 Backdoor CnC Init
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-