Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 14:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c0771afb6d2c438738d475a030345155.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
c0771afb6d2c438738d475a030345155.exe
-
Size
2.0MB
-
MD5
c0771afb6d2c438738d475a030345155
-
SHA1
532b817ea3d16a3acbced3e4d385fc485ec290f4
-
SHA256
f1278b48576982cafe7efbe9a529d710d90462ca3015f915890811c1a64ad503
-
SHA512
b4a8f99f8b1d0d7f101a12106675d7236104bfde083f057820687315cf4fcd485a27db051e477900da7348d83023cce2d006f3c7372dee5d716877a8293fdc05
-
SSDEEP
49152:qs82io1naWsNH2L7mVWjxYNqGJ3f97rX569FLJnbP9:qs8YdoNWL7w+GJP97rXaFH
Malware Config
Signatures
-
SectopRAT payload 16 IoCs
resource yara_rule behavioral2/memory/4828-2-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-10-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-11-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-13-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-16-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-17-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-18-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-19-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-20-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-21-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-22-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-23-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-24-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-25-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-26-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat behavioral2/memory/4828-27-0x0000000000800000-0x0000000001110000-memory.dmp family_sectoprat -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe 4828 c0771afb6d2c438738d475a030345155.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4828 c0771afb6d2c438738d475a030345155.exe