General
-
Target
315b63093ae9218ebdeaeb5120e17d7fa81bc7bae694fff673a205efaadd7b86.zip
-
Size
1.1MB
-
Sample
230321-rvmvjsda6v
-
MD5
f44cd174186bb94b0189d243411051fd
-
SHA1
13d455c29d4fc91f0856bad94c8f30320f588122
-
SHA256
55108ea57f47939a336a8bed35d8be38509c3a88f120797e62ebdb2e025a49b8
-
SHA512
6778bb2b0cd1a10a8a7bccd53dda3272243c42729b52ba7bc35f336324d80ce3082cd1c4a3ff68ec13c45bcf7a3eadb651a98ef5102aadf70a2fd29f9fc5255f
-
SSDEEP
24576:j2/U4A9QhVuvv4Shcb8g6HE1PbfkWaPzw9Q:q/qgqv4ag6mzfkVzKQ
Static task
static1
Behavioral task
behavioral1
Sample
315b63093ae9218ebdeaeb5120e17d7fa81bc7bae694fff673a205efaadd7b86.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
315b63093ae9218ebdeaeb5120e17d7fa81bc7bae694fff673a205efaadd7b86.exe
-
Size
1.1MB
-
MD5
aedef5976cbed764e16089f0cd5b79e0
-
SHA1
a21cc8e454927fa878efb34491fdba1cd7ff90c7
-
SHA256
315b63093ae9218ebdeaeb5120e17d7fa81bc7bae694fff673a205efaadd7b86
-
SHA512
c3e0066946bb2934b682d1cc7293822e57b2a8451e64150053c4e8c2bee76f14a3d7e11b2b77145f60e3479df5d0f25453cb2f776ecf5c2a9263e33c105d4d63
-
SSDEEP
24576:5Q+7rOqFARbKlkTPiZ/V2RdpldkWeaoF9pG5QqRtuAZ:5Q+7rOqF8bKuIULp7kWexte
-
SectopRAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-