General

  • Target

    tmp

  • Size

    12.4MB

  • Sample

    230207-qfx7asfa81

  • MD5

    3e2c3e5f1519583f450f2c658720de0f

  • SHA1

    5a85dc4aad7894eb1d2e522c17ec6cf489b36dec

  • SHA256

    6503af884f87235c82c36b47fd40fc0cc61dc82aa479c0f3196c3a0b97209886

  • SHA512

    4a43da0f3ea058795d4796f4e0794fe524983e2643771d073890a48512554517745dcaa0475173e690a49ba855bf088f93fab9f131711930f7bf3dbbf2a84d5b

  • SSDEEP

    393216:yLF7hgdtdOT0y62yqgJDt1gn/2CuuegmdBXpEXjGD6ApgMyx708OK:yZF+tnDKght8x

Score
10/10

Malware Config

Targets

    • Target

      tmp

    • Size

      12.4MB

    • MD5

      3e2c3e5f1519583f450f2c658720de0f

    • SHA1

      5a85dc4aad7894eb1d2e522c17ec6cf489b36dec

    • SHA256

      6503af884f87235c82c36b47fd40fc0cc61dc82aa479c0f3196c3a0b97209886

    • SHA512

      4a43da0f3ea058795d4796f4e0794fe524983e2643771d073890a48512554517745dcaa0475173e690a49ba855bf088f93fab9f131711930f7bf3dbbf2a84d5b

    • SSDEEP

      393216:yLF7hgdtdOT0y62yqgJDt1gn/2CuuegmdBXpEXjGD6ApgMyx708OK:yZF+tnDKght8x

    Score
    10/10
    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks