General

  • Target

    51e94d549fea3488fb890e3411191a8c6233051ac0ad74ecad330095983d2271

  • Size

    411KB

  • Sample

    240425-ltnskahe85

  • MD5

    c29446e707ee153977b82e9a51800021

  • SHA1

    e07ce115e4d3fb9806ef53e6e263cf0b1619f101

  • SHA256

    51e94d549fea3488fb890e3411191a8c6233051ac0ad74ecad330095983d2271

  • SHA512

    1584e578dc2b626a10a54925194e5103809d6afef356aacbb636b3d6b1386d1322b2a0b0c03be7c888fc1cec048957801df707dd4a437035eabde0fc3ea02d38

  • SSDEEP

    6144:I+x1ShTyz9EqOq21LVVb7ZpK2FoICp+fGqhDbSe8Lbp779ZLzW6:9xo2X2xV1ZpKJICpZqR2bdhc6

Malware Config

Targets

    • Target

      51e94d549fea3488fb890e3411191a8c6233051ac0ad74ecad330095983d2271

    • Size

      411KB

    • MD5

      c29446e707ee153977b82e9a51800021

    • SHA1

      e07ce115e4d3fb9806ef53e6e263cf0b1619f101

    • SHA256

      51e94d549fea3488fb890e3411191a8c6233051ac0ad74ecad330095983d2271

    • SHA512

      1584e578dc2b626a10a54925194e5103809d6afef356aacbb636b3d6b1386d1322b2a0b0c03be7c888fc1cec048957801df707dd4a437035eabde0fc3ea02d38

    • SSDEEP

      6144:I+x1ShTyz9EqOq21LVVb7ZpK2FoICp+fGqhDbSe8Lbp779ZLzW6:9xo2X2xV1ZpKJICpZqR2bdhc6

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks