General
-
Target
BR_JC.exe
-
Size
2.5MB
-
Sample
230901-tky6yafg7w
-
MD5
91519580ba491240ece3cf4daa8f2a79
-
SHA1
fb73c136c0316f5607d374f5497121ff7b908768
-
SHA256
ecad64e2cb8dcc58e3666fbdb52a4455769878837b8559b48c74259a2094eb10
-
SHA512
e994378943b27a35d8682d8c27a5ec8e6e954edb6882133e2fd99010d563bf7a926c3595ae641283039afdc45112a93fc252e4b5af670a3e0f9511268f86ff9f
-
SSDEEP
49152:KtVha9KI9AkZPq7LwDzXajLOB4IvOkVJ+1CtmVVBpUD0sDTITKQz:iVQ9XykrwLOB4uOW8oUVoRtQ
Behavioral task
behavioral1
Sample
BR_JC.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
BR_JC.exe
-
Size
2.5MB
-
MD5
91519580ba491240ece3cf4daa8f2a79
-
SHA1
fb73c136c0316f5607d374f5497121ff7b908768
-
SHA256
ecad64e2cb8dcc58e3666fbdb52a4455769878837b8559b48c74259a2094eb10
-
SHA512
e994378943b27a35d8682d8c27a5ec8e6e954edb6882133e2fd99010d563bf7a926c3595ae641283039afdc45112a93fc252e4b5af670a3e0f9511268f86ff9f
-
SSDEEP
49152:KtVha9KI9AkZPq7LwDzXajLOB4IvOkVJ+1CtmVVBpUD0sDTITKQz:iVQ9XykrwLOB4uOW8oUVoRtQ
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-