General

  • Target

    5772e6f313ca3a6539f0c6031a92f716

  • Size

    2.2MB

  • Sample

    240113-aaq8sshab6

  • MD5

    5772e6f313ca3a6539f0c6031a92f716

  • SHA1

    6e20c2220a05c8cf65669c92752f234ea15b42e0

  • SHA256

    6399d04f2077b45702de8c54e39352e39113f5b2300dcf049d97a7269c16b6cb

  • SHA512

    19b3d0de2df13dfe8424d632e60ae7d086c56f926e2950e2b22d2574b00b5aaec32b21235f4488adb32b050f0ee1ab8d1ee1807c0f2269342e2bb729d92629e3

  • SSDEEP

    49152:x3I1msZAd2Yu7a4cQDh5Awo7OoPrHMQJa2mbmqaH71eYqhaZG:x+msSsYu7a7QDh5ApPsQY2mKBJGh

Score
10/10

Malware Config

Targets

    • Target

      5772e6f313ca3a6539f0c6031a92f716

    • Size

      2.2MB

    • MD5

      5772e6f313ca3a6539f0c6031a92f716

    • SHA1

      6e20c2220a05c8cf65669c92752f234ea15b42e0

    • SHA256

      6399d04f2077b45702de8c54e39352e39113f5b2300dcf049d97a7269c16b6cb

    • SHA512

      19b3d0de2df13dfe8424d632e60ae7d086c56f926e2950e2b22d2574b00b5aaec32b21235f4488adb32b050f0ee1ab8d1ee1807c0f2269342e2bb729d92629e3

    • SSDEEP

      49152:x3I1msZAd2Yu7a4cQDh5Awo7OoPrHMQJa2mbmqaH71eYqhaZG:x+msSsYu7a7QDh5ApPsQY2mKBJGh

    Score
    10/10
    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix

Tasks