General

  • Target

    184be2a73a16e66153a8af6958c16b9d

  • Size

    905KB

  • Sample

    220610-apgb5sdfeq

  • MD5

    184be2a73a16e66153a8af6958c16b9d

  • SHA1

    119957a445db96c9e151a326c535fe36c70adda7

  • SHA256

    9e9eae41469ebcfc9d59edafcb66c6f2eed5850c06d0306f4a1cc3eb47afc85e

  • SHA512

    3682b333ff8f0e759467929b2f564ebdc1735f4ed42d3a59ac4e5dd1f9492f024ee361b390df66421535c45c157da137206eeb7d6376684c2322b8e73e2d074a

Malware Config

Targets

    • Target

      184be2a73a16e66153a8af6958c16b9d

    • Size

      905KB

    • MD5

      184be2a73a16e66153a8af6958c16b9d

    • SHA1

      119957a445db96c9e151a326c535fe36c70adda7

    • SHA256

      9e9eae41469ebcfc9d59edafcb66c6f2eed5850c06d0306f4a1cc3eb47afc85e

    • SHA512

      3682b333ff8f0e759467929b2f564ebdc1735f4ed42d3a59ac4e5dd1f9492f024ee361b390df66421535c45c157da137206eeb7d6376684c2322b8e73e2d074a

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT Payload

    • UAC bypass

    • suricata: ET MALWARE Arechclient2 Backdoor CnC Init

      suricata: ET MALWARE Arechclient2 Backdoor CnC Init

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks