General
-
Target
0e0bd47371b5e50fc51f147dc456949f8db70ec27b6443270b07e05a09e82955.zip
-
Size
1.5MB
-
Sample
230321-rvl81sda6s
-
MD5
c9a17167d98e9ba29d3a291f249c876c
-
SHA1
bb9c4c81500ce7ab5434f3cdd03c592cb84ebc2f
-
SHA256
cf0f1dcddd5a8f3eec2417af48ab77f0bc18484028db84ec5751eddd26912aeb
-
SHA512
68f5e9296c549769673867863ead8ba6de515fd59e80219594dff70064af391c929dd86477ac6105280ac34db937d7390a75b9770caf74ee33edb686117cc5a6
-
SSDEEP
49152:LGrftUhFvJQh6g1xmLR1AL2jLj8seVIbTsI3:yriveF1xOoC6VaTsI
Static task
static1
Behavioral task
behavioral1
Sample
0e0bd47371b5e50fc51f147dc456949f8db70ec27b6443270b07e05a09e82955.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
0e0bd47371b5e50fc51f147dc456949f8db70ec27b6443270b07e05a09e82955.exe
-
Size
1.6MB
-
MD5
f6de765e9c3c66696dad7d81790aa9cb
-
SHA1
7416401227b3e746a4f95e0cc3c4c87fedcaf1e2
-
SHA256
0e0bd47371b5e50fc51f147dc456949f8db70ec27b6443270b07e05a09e82955
-
SHA512
22d045d940dd251873269a90d9327e081a6495eb4b20741fd2d4a0978038076104fa7221ddee2d06715d84739fd38e5588728308dd00835fd16d425305a148f0
-
SSDEEP
24576:8WmAFubS0dt9Mcp6YaC02T8ADLdWkn8ikR+8Mx5SpqmxoqDKRtT2ZJyE:w20dRp6Yn04V9WH/O5uqmxhDKRho0E
-
SectopRAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-