General

  • Target

    315b63093ae9218ebdeaeb5120e17d7fa81bc7bae694fff673a205efaadd7b86.zip

  • Size

    1.1MB

  • Sample

    230321-rvmvjsda6v

  • MD5

    f44cd174186bb94b0189d243411051fd

  • SHA1

    13d455c29d4fc91f0856bad94c8f30320f588122

  • SHA256

    55108ea57f47939a336a8bed35d8be38509c3a88f120797e62ebdb2e025a49b8

  • SHA512

    6778bb2b0cd1a10a8a7bccd53dda3272243c42729b52ba7bc35f336324d80ce3082cd1c4a3ff68ec13c45bcf7a3eadb651a98ef5102aadf70a2fd29f9fc5255f

  • SSDEEP

    24576:j2/U4A9QhVuvv4Shcb8g6HE1PbfkWaPzw9Q:q/qgqv4ag6mzfkVzKQ

Malware Config

Targets

    • Target

      315b63093ae9218ebdeaeb5120e17d7fa81bc7bae694fff673a205efaadd7b86.exe

    • Size

      1.1MB

    • MD5

      aedef5976cbed764e16089f0cd5b79e0

    • SHA1

      a21cc8e454927fa878efb34491fdba1cd7ff90c7

    • SHA256

      315b63093ae9218ebdeaeb5120e17d7fa81bc7bae694fff673a205efaadd7b86

    • SHA512

      c3e0066946bb2934b682d1cc7293822e57b2a8451e64150053c4e8c2bee76f14a3d7e11b2b77145f60e3479df5d0f25453cb2f776ecf5c2a9263e33c105d4d63

    • SSDEEP

      24576:5Q+7rOqFARbKlkTPiZ/V2RdpldkWeaoF9pG5QqRtuAZ:5Q+7rOqF8bKuIULp7kWexte

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UAC bypass

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks