General

  • Target

    4ffd17b3b30170253a216e0f96e9588e

  • Size

    3.2MB

  • Sample

    231226-dxpv2afhf5

  • MD5

    4ffd17b3b30170253a216e0f96e9588e

  • SHA1

    b9f1b49fc8cdfca89dd7e19ca13171d40ff7d867

  • SHA256

    0d5d3419a81569a6728611f22160b49d2241600a68d6395747aa8b3469ac6105

  • SHA512

    39e33ece5f5018c8cb9843d97e18f5ec13cb57bd4becf0f657fe2a21968d937b5215e508b8702ee800311862f950e3871740a3c5c5d569b05af266455db826ff

  • SSDEEP

    98304:rjIr9rqFpcA6FSonqPZK6z6BBFQ3gjnvuRJpKTLsvRtv2:wkpcAvocluBQQaDpKP8o

Malware Config

Targets

    • Target

      4ffd17b3b30170253a216e0f96e9588e

    • Size

      3.2MB

    • MD5

      4ffd17b3b30170253a216e0f96e9588e

    • SHA1

      b9f1b49fc8cdfca89dd7e19ca13171d40ff7d867

    • SHA256

      0d5d3419a81569a6728611f22160b49d2241600a68d6395747aa8b3469ac6105

    • SHA512

      39e33ece5f5018c8cb9843d97e18f5ec13cb57bd4becf0f657fe2a21968d937b5215e508b8702ee800311862f950e3871740a3c5c5d569b05af266455db826ff

    • SSDEEP

      98304:rjIr9rqFpcA6FSonqPZK6z6BBFQ3gjnvuRJpKTLsvRtv2:wkpcAvocluBQQaDpKP8o

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks