Analysis
-
max time kernel
138s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2023, 15:01
Behavioral task
behavioral1
Sample
decoded-1.exe
Resource
win7-20230712-en
3 signatures
150 seconds
General
-
Target
decoded-1.exe
-
Size
474KB
-
MD5
6f1b09e588799f7f01cf305d04dcf7e1
-
SHA1
dbd55d202c71e1f9f424833e0d4d5898fcdf0da7
-
SHA256
d0c82fc552ea513343fc349f26d030b226f6a21372e9ddeebcbffc3a2023a42a
-
SHA512
7f55fb408e3f17f723f592333127304d6c62271b13726f9590d1c84139b67405b5cf519e51f98c8ba5a1fb483fc76b83d89b6be6f00bd4e902a0ac2f93f767af
-
SSDEEP
6144:ulBYO4yjEb17TcMz5/hQluj0oGWA9HowGD9kh0vIOnPGkXlz34kseA6qtZTOaoWm:4aO4Xb1740ZDw+vIcOkXlzoEqtF
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/1252-134-0x0000000000EF0000-0x0000000000F6C000-memory.dmp family_sectoprat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.