General

  • Target

    c3488845b02c149d06643c8181f5fefe

  • Size

    3.1MB

  • Sample

    240312-nycl7shh85

  • MD5

    c3488845b02c149d06643c8181f5fefe

  • SHA1

    b9ded030f6daedbbc970c3ce89f1d9de2bf717d6

  • SHA256

    b070a16b8837a3d9242c0e6223bf320bac589e3b1545651a1bcf10abd5ce4fb8

  • SHA512

    055b81d4b5796e863fc1dcba64c7293e3af87c8bdd3bf16a4dbbf98a34bbcd43d2f57f9e1633210890a67ed6f2eab20c2cd4efe1fb12f46daac3f97c945773ad

  • SSDEEP

    49152:RiUBNffzrYhJLc7g1Brofo5XjURM3tCjd9nY/2RPpuBEwasZOSepDR1:RDdOc75oh3tEnY/0hUG

Malware Config

Targets

    • Target

      c3488845b02c149d06643c8181f5fefe

    • Size

      3.1MB

    • MD5

      c3488845b02c149d06643c8181f5fefe

    • SHA1

      b9ded030f6daedbbc970c3ce89f1d9de2bf717d6

    • SHA256

      b070a16b8837a3d9242c0e6223bf320bac589e3b1545651a1bcf10abd5ce4fb8

    • SHA512

      055b81d4b5796e863fc1dcba64c7293e3af87c8bdd3bf16a4dbbf98a34bbcd43d2f57f9e1633210890a67ed6f2eab20c2cd4efe1fb12f46daac3f97c945773ad

    • SSDEEP

      49152:RiUBNffzrYhJLc7g1Brofo5XjURM3tCjd9nY/2RPpuBEwasZOSepDR1:RDdOc75oh3tEnY/0hUG

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks