General

  • Target

    a0c73f5d940754b7cc2a790a0d4f48b51b3568ce1101fb0d3df3c307ae835111

  • Size

    1.8MB

  • Sample

    231122-fjkp9sbb41

  • MD5

    2ea25fcf4fec229f7dd7fc8bb32bf0ed

  • SHA1

    11da6740a2b2136812b7398711496e9392a534f9

  • SHA256

    a0c73f5d940754b7cc2a790a0d4f48b51b3568ce1101fb0d3df3c307ae835111

  • SHA512

    09b295831ecd1196ac000a3fb0dabb32280627372768d69f9df15c246a2bc06109034be60000d12b30d8f7b854bbe61e3c28210d1a6f60f3edab6fed1f74a290

  • SSDEEP

    24576:7SzVcXU1U+L6Wpu2DQ1yI3oPmh1NUwZrGLU/LbNtRvN7d2Yk7/2kd/AHy:7JyY4oUwZqe7R7232kdAy

Malware Config

Targets

    • Target

      a0c73f5d940754b7cc2a790a0d4f48b51b3568ce1101fb0d3df3c307ae835111

    • Size

      1.8MB

    • MD5

      2ea25fcf4fec229f7dd7fc8bb32bf0ed

    • SHA1

      11da6740a2b2136812b7398711496e9392a534f9

    • SHA256

      a0c73f5d940754b7cc2a790a0d4f48b51b3568ce1101fb0d3df3c307ae835111

    • SHA512

      09b295831ecd1196ac000a3fb0dabb32280627372768d69f9df15c246a2bc06109034be60000d12b30d8f7b854bbe61e3c28210d1a6f60f3edab6fed1f74a290

    • SSDEEP

      24576:7SzVcXU1U+L6Wpu2DQ1yI3oPmh1NUwZrGLU/LbNtRvN7d2Yk7/2kd/AHy:7JyY4oUwZqe7R7232kdAy

    • Detects Arechclient2 RAT

      Arechclient2.

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks