General

  • Target

    YoutubeAdvert.exe

  • Size

    3.3MB

  • Sample

    230718-ve4d5scd92

  • MD5

    4509256a05f0d4090c11f2d424a33529

  • SHA1

    a0812e84e6c423b55c771ad05695cff5e20b37e7

  • SHA256

    48fe1f7de453f1c52b9c1e8f16017e2a39f7cf45ba57748809196f9fd3fcb63e

  • SHA512

    c9ffceb1bb74b7953216af6a6799959386185b9b29d17013956706192b614e581fef2643f84ecfd2844f9ae0ea696aef72bc45198384c74100272581fc08fd1d

  • SSDEEP

    98304:UPmS8VELAMoLmnXETJkK6rcfC9kUAm6yK6u:M8VwAM4cElkK6oskUA9

Malware Config

Targets

    • Target

      YoutubeAdvert.exe

    • Size

      3.3MB

    • MD5

      4509256a05f0d4090c11f2d424a33529

    • SHA1

      a0812e84e6c423b55c771ad05695cff5e20b37e7

    • SHA256

      48fe1f7de453f1c52b9c1e8f16017e2a39f7cf45ba57748809196f9fd3fcb63e

    • SHA512

      c9ffceb1bb74b7953216af6a6799959386185b9b29d17013956706192b614e581fef2643f84ecfd2844f9ae0ea696aef72bc45198384c74100272581fc08fd1d

    • SSDEEP

      98304:UPmS8VELAMoLmnXETJkK6rcfC9kUAm6yK6u:M8VwAM4cElkK6oskUA9

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks