General

  • Target

    86d493785e7f2c546e093fa17dff318c

  • Size

    5.1MB

  • Sample

    231222-m3fc8agedk

  • MD5

    86d493785e7f2c546e093fa17dff318c

  • SHA1

    e07a8e97ba3a77f0e873f8788c6415dabdc247ae

  • SHA256

    1285210f0e747247cab76cfb24918cb53ffe37adc5698a618718711765c8717a

  • SHA512

    e8c30912c76a56c675141ab5ed518eb7f52584d0ec541c85494d18da7dd345db0bcf68bae13c619f6d0d8217a499438fac7ea2d06d34fcc13de05c7eacd87a8c

  • SSDEEP

    98304:Oi2QJ4huvvkX0wsf1eiKbcXy8RmogCzNiwrldFtwx4MnuyH2Zo4OR1n0ZY4O:fJ4MvvkX0tfIiKgXyKqqBrlz44Muyj46

Malware Config

Targets

    • Target

      86d493785e7f2c546e093fa17dff318c

    • Size

      5.1MB

    • MD5

      86d493785e7f2c546e093fa17dff318c

    • SHA1

      e07a8e97ba3a77f0e873f8788c6415dabdc247ae

    • SHA256

      1285210f0e747247cab76cfb24918cb53ffe37adc5698a618718711765c8717a

    • SHA512

      e8c30912c76a56c675141ab5ed518eb7f52584d0ec541c85494d18da7dd345db0bcf68bae13c619f6d0d8217a499438fac7ea2d06d34fcc13de05c7eacd87a8c

    • SSDEEP

      98304:Oi2QJ4huvvkX0wsf1eiKbcXy8RmogCzNiwrldFtwx4MnuyH2Zo4OR1n0ZY4O:fJ4MvvkX0tfIiKgXyKqqBrlz44Muyj46

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks