Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2023 12:08
General
-
Target
ffd45c2b562d30113cb9a4823025a9a162503017e9d81fd96ddb5b98e5bb89bd.exe
-
Size
3.0MB
-
MD5
1c7a29f48b56d6e89620c0c55d515095
-
SHA1
6362eed3be15d632ce62400a159f483e1ffd7610
-
SHA256
ffd45c2b562d30113cb9a4823025a9a162503017e9d81fd96ddb5b98e5bb89bd
-
SHA512
16c1e03386e289a4a5aa24190d2c6ad05f87a657d92a210e0d6aecb5afaf5bfac1654437c780d2a4d8d9a9212c67a387d66a9f12a71756331fe0246035496b48
-
SSDEEP
98304:v6rcWNztTkmXubthKXwkgzdXqS/jwHxMz9IPctmZS:SrLNvubthKXxCaLM+Pctq
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/4988-142-0x0000000000400000-0x0000000000B8A000-memory.dmp family_sectoprat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/4988-142-0x0000000000400000-0x0000000000B8A000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4988 ffd45c2b562d30113cb9a4823025a9a162503017e9d81fd96ddb5b98e5bb89bd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4988 ffd45c2b562d30113cb9a4823025a9a162503017e9d81fd96ddb5b98e5bb89bd.exe 4988 ffd45c2b562d30113cb9a4823025a9a162503017e9d81fd96ddb5b98e5bb89bd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffd45c2b562d30113cb9a4823025a9a162503017e9d81fd96ddb5b98e5bb89bd.exe"C:\Users\Admin\AppData\Local\Temp\ffd45c2b562d30113cb9a4823025a9a162503017e9d81fd96ddb5b98e5bb89bd.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4988