General

  • Target

    0c39642431246745f347de9e82eb9618

  • Size

    2.4MB

  • Sample

    231230-dda8jafehk

  • MD5

    0c39642431246745f347de9e82eb9618

  • SHA1

    790ef2b105103e87929f48655625ae56834fb653

  • SHA256

    7a3249290a094efd595411b33810028f4417a6b4521fe9369baded0a1672f6e3

  • SHA512

    4f6e3af0ce72730fa236e1b110e595dee445830b5af2c3a61159453f6bd0ef2b2b71040c5cc87441109f80d46e3c882c8b1a3a74bb95c2d06c517ceb861d36ad

  • SSDEEP

    49152:m6qvNHyKZ2Clq0zkCO78DqWJtjRYm5d4KNliwac6bFnaxVW+g+:kkZmq0zk5OqWJtjr5dzer9bFaWs

Malware Config

Targets

    • Target

      0c39642431246745f347de9e82eb9618

    • Size

      2.4MB

    • MD5

      0c39642431246745f347de9e82eb9618

    • SHA1

      790ef2b105103e87929f48655625ae56834fb653

    • SHA256

      7a3249290a094efd595411b33810028f4417a6b4521fe9369baded0a1672f6e3

    • SHA512

      4f6e3af0ce72730fa236e1b110e595dee445830b5af2c3a61159453f6bd0ef2b2b71040c5cc87441109f80d46e3c882c8b1a3a74bb95c2d06c517ceb861d36ad

    • SSDEEP

      49152:m6qvNHyKZ2Clq0zkCO78DqWJtjRYm5d4KNliwac6bFnaxVW+g+:kkZmq0zk5OqWJtjr5dzer9bFaWs

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks