General

  • Target

    1590729c0c494bec67b052487014a86c

  • Size

    3.1MB

  • Sample

    231224-2by4kschdl

  • MD5

    1590729c0c494bec67b052487014a86c

  • SHA1

    2d5136099868b71fbe2f5d09a869d3925ec6a72d

  • SHA256

    077a1cd138704282434ff2f6dd2084592f23da9ee1f0408a98f30c3cec87b910

  • SHA512

    78e0fc06afc512b76b74b59d893725a3eca65462585a19d063c831f22002bedade824ab59655bc3c31d6c8cd3e7d7b8d8a1cc6cde05a2962caadf5b44a1fc9bc

  • SSDEEP

    98304:j8UqoYQv9A6mjUCn9Phrc1SGnh5mcSaxzL1:j/DYcDmjUC9DOcyv1

Malware Config

Targets

    • Target

      1590729c0c494bec67b052487014a86c

    • Size

      3.1MB

    • MD5

      1590729c0c494bec67b052487014a86c

    • SHA1

      2d5136099868b71fbe2f5d09a869d3925ec6a72d

    • SHA256

      077a1cd138704282434ff2f6dd2084592f23da9ee1f0408a98f30c3cec87b910

    • SHA512

      78e0fc06afc512b76b74b59d893725a3eca65462585a19d063c831f22002bedade824ab59655bc3c31d6c8cd3e7d7b8d8a1cc6cde05a2962caadf5b44a1fc9bc

    • SSDEEP

      98304:j8UqoYQv9A6mjUCn9Phrc1SGnh5mcSaxzL1:j/DYcDmjUC9DOcyv1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks