General

  • Target

    b9d218ecfd1df72128212c8a2fc10ca7

  • Size

    4.2MB

  • Sample

    240307-2d67zafg49

  • MD5

    b9d218ecfd1df72128212c8a2fc10ca7

  • SHA1

    8cb9e806b421cc2da6e1cd55aad2f22d3668b2d2

  • SHA256

    21d8bc5313b673597a5685c1be7b921fc7721e8b7d706cbc14fc397a0a68bcd2

  • SHA512

    e6273a34f12d5a9a8dd8715c187da8948327a023e5e956288de6af26f04c4fe295e8bc755378c41f0ce410a7ff89340b4a5e5bb7dd35e2872ddbb71875ec8719

  • SSDEEP

    98304:GnH0P/qajgjmOYQ+j2+d/Oj0q5GGJd+ba9gNxPgtq5jT28:Gn6H0jmcYGz0CdzgNxPV28

Malware Config

Targets

    • Target

      b9d218ecfd1df72128212c8a2fc10ca7

    • Size

      4.2MB

    • MD5

      b9d218ecfd1df72128212c8a2fc10ca7

    • SHA1

      8cb9e806b421cc2da6e1cd55aad2f22d3668b2d2

    • SHA256

      21d8bc5313b673597a5685c1be7b921fc7721e8b7d706cbc14fc397a0a68bcd2

    • SHA512

      e6273a34f12d5a9a8dd8715c187da8948327a023e5e956288de6af26f04c4fe295e8bc755378c41f0ce410a7ff89340b4a5e5bb7dd35e2872ddbb71875ec8719

    • SSDEEP

      98304:GnH0P/qajgjmOYQ+j2+d/Oj0q5GGJd+ba9gNxPgtq5jT28:Gn6H0jmcYGz0CdzgNxPV28

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks