General

  • Target

    BR_JC.exe

  • Size

    2.5MB

  • Sample

    230901-tky6yafg7w

  • MD5

    91519580ba491240ece3cf4daa8f2a79

  • SHA1

    fb73c136c0316f5607d374f5497121ff7b908768

  • SHA256

    ecad64e2cb8dcc58e3666fbdb52a4455769878837b8559b48c74259a2094eb10

  • SHA512

    e994378943b27a35d8682d8c27a5ec8e6e954edb6882133e2fd99010d563bf7a926c3595ae641283039afdc45112a93fc252e4b5af670a3e0f9511268f86ff9f

  • SSDEEP

    49152:KtVha9KI9AkZPq7LwDzXajLOB4IvOkVJ+1CtmVVBpUD0sDTITKQz:iVQ9XykrwLOB4uOW8oUVoRtQ

Malware Config

Targets

    • Target

      BR_JC.exe

    • Size

      2.5MB

    • MD5

      91519580ba491240ece3cf4daa8f2a79

    • SHA1

      fb73c136c0316f5607d374f5497121ff7b908768

    • SHA256

      ecad64e2cb8dcc58e3666fbdb52a4455769878837b8559b48c74259a2094eb10

    • SHA512

      e994378943b27a35d8682d8c27a5ec8e6e954edb6882133e2fd99010d563bf7a926c3595ae641283039afdc45112a93fc252e4b5af670a3e0f9511268f86ff9f

    • SSDEEP

      49152:KtVha9KI9AkZPq7LwDzXajLOB4IvOkVJ+1CtmVVBpUD0sDTITKQz:iVQ9XykrwLOB4uOW8oUVoRtQ

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks