General
-
Target
325cedfb3e4d23ddf1062ad55b6f6b6e.exe
-
Size
3.7MB
-
Sample
230614-jr41naef68
-
MD5
325cedfb3e4d23ddf1062ad55b6f6b6e
-
SHA1
bd30d64d8dd8f4862461da3137686951870a466f
-
SHA256
38d7fbdc314f881b461c766742a26d3df72c553d25c8f1c20da1adcdbea1afef
-
SHA512
17daf234fdaedca6b4a5b6e7a8b34f0ae5ffefc1c4c11edb40f87498d25b09377b0898b3ad648ed093a6b35ce6b227a3f9f69e37e752931f2722f61c23f066ab
-
SSDEEP
98304:uSWz0m6iijzsGupvTo9GDd1HwAOiU0KIX6ksJc:Tfti2Ys9GDd1HjpU0pX6m
Static task
static1
Behavioral task
behavioral1
Sample
325cedfb3e4d23ddf1062ad55b6f6b6e.exe
Resource
win7-20230220-en
Malware Config
Extracted
amadey
3.83
62.182.156.152/so57Nst/index.php
Extracted
systembc
5.42.65.67:4298
localhost.exchange:4298
Targets
-
-
Target
325cedfb3e4d23ddf1062ad55b6f6b6e.exe
-
Size
3.7MB
-
MD5
325cedfb3e4d23ddf1062ad55b6f6b6e
-
SHA1
bd30d64d8dd8f4862461da3137686951870a466f
-
SHA256
38d7fbdc314f881b461c766742a26d3df72c553d25c8f1c20da1adcdbea1afef
-
SHA512
17daf234fdaedca6b4a5b6e7a8b34f0ae5ffefc1c4c11edb40f87498d25b09377b0898b3ad648ed093a6b35ce6b227a3f9f69e37e752931f2722f61c23f066ab
-
SSDEEP
98304:uSWz0m6iijzsGupvTo9GDd1HwAOiU0KIX6ksJc:Tfti2Ys9GDd1HjpU0pX6m
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-