General

  • Target

    18455571d39b95ea7e86069df7c92ffc

  • Size

    5.4MB

  • Sample

    231230-pgrv8sfebq

  • MD5

    18455571d39b95ea7e86069df7c92ffc

  • SHA1

    d91452886cfe61df20dc1ffae7a1ceee4c678f89

  • SHA256

    3f828e7e157fb341966ae1ee75bb646537a4475eeeb720ce18f534f344213c1c

  • SHA512

    bc4681537f9f0ff7c42d7f054f73a496de5f08438fd46d827b53bd5560c841838dd6f78f75934b3da08509b4779f55923ced8191ba48bb6f034636d86c4a7c8d

  • SSDEEP

    98304:10/kzwXAc0V36CovXksEdFGh1XeOXylZp6iS9tjjF8Zo9vIPJyjUBWUoCd5nR:10/6VqVXnj/XeWH95jqZ+Ixy1/Cd5R

Malware Config

Targets

    • Target

      18455571d39b95ea7e86069df7c92ffc

    • Size

      5.4MB

    • MD5

      18455571d39b95ea7e86069df7c92ffc

    • SHA1

      d91452886cfe61df20dc1ffae7a1ceee4c678f89

    • SHA256

      3f828e7e157fb341966ae1ee75bb646537a4475eeeb720ce18f534f344213c1c

    • SHA512

      bc4681537f9f0ff7c42d7f054f73a496de5f08438fd46d827b53bd5560c841838dd6f78f75934b3da08509b4779f55923ced8191ba48bb6f034636d86c4a7c8d

    • SSDEEP

      98304:10/kzwXAc0V36CovXksEdFGh1XeOXylZp6iS9tjjF8Zo9vIPJyjUBWUoCd5nR:10/6VqVXnj/XeWH95jqZ+Ixy1/Cd5R

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks