General

  • Target

    7a2d2e9abdd5d210007969efc6ad1bbec322329253895fd09b60d9d118e03129_JC.exe

  • Size

    2.5MB

  • Sample

    230823-vjyz8aff31

  • MD5

    0cb74296cc79ff0a20f5046f8e80d7b0

  • SHA1

    175c5b445ea486f2de1c6e0771855768018726d4

  • SHA256

    7a2d2e9abdd5d210007969efc6ad1bbec322329253895fd09b60d9d118e03129

  • SHA512

    fd9aa68e59c998e9be77562b0eed491909bd0a97408fff219313a0700bcb39e1b19d4060e51c23f9cd258d3b2b5124e5c13bd81f88bcfb3e55fcf4c8f96fa29a

  • SSDEEP

    49152:GdOSvW+BpGy9/5DL3C4wvsdb9Nt8iy+NZfTJ5XkrwHF9fJKDNTn:oOYW0X15DL3C4ispzt8KPTTsTn

Malware Config

Targets

    • Target

      7a2d2e9abdd5d210007969efc6ad1bbec322329253895fd09b60d9d118e03129_JC.exe

    • Size

      2.5MB

    • MD5

      0cb74296cc79ff0a20f5046f8e80d7b0

    • SHA1

      175c5b445ea486f2de1c6e0771855768018726d4

    • SHA256

      7a2d2e9abdd5d210007969efc6ad1bbec322329253895fd09b60d9d118e03129

    • SHA512

      fd9aa68e59c998e9be77562b0eed491909bd0a97408fff219313a0700bcb39e1b19d4060e51c23f9cd258d3b2b5124e5c13bd81f88bcfb3e55fcf4c8f96fa29a

    • SSDEEP

      49152:GdOSvW+BpGy9/5DL3C4wvsdb9Nt8iy+NZfTJ5XkrwHF9fJKDNTn:oOYW0X15DL3C4ispzt8KPTTsTn

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks