Analysis Overview
SHA256
4ff41d9b16384fb388eaf0d8dc5142dc65f209fd779f407fd0dfe0df286812d2
Threat Level: Known bad
The file 2d8c1cae9f4d8aeb07e4780ab7c21297.exe was found to be: Known bad.
Malicious Activity Summary
SectopRAT payload
Sectoprat family
SectopRAT
Reads user/profile data of web browsers
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Accesses cryptocurrency files/wallets, possible credential harvesting
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-29 08:31
Signatures
SectopRAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Sectoprat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-29 08:31
Reported
2024-04-29 08:33
Platform
win7-20240221-en
Max time kernel
129s
Max time network
133s
Command Line
Signatures
SectopRAT
SectopRAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2d8c1cae9f4d8aeb07e4780ab7c21297.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2d8c1cae9f4d8aeb07e4780ab7c21297.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2d8c1cae9f4d8aeb07e4780ab7c21297.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2d8c1cae9f4d8aeb07e4780ab7c21297.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2d8c1cae9f4d8aeb07e4780ab7c21297.exe
"C:\Users\Admin\AppData\Local\Temp\2d8c1cae9f4d8aeb07e4780ab7c21297.exe"
Network
| Country | Destination | Domain | Proto |
| NL | 185.73.125.96:15647 | tcp | |
| NL | 185.73.125.96:9000 | 185.73.125.96 | tcp |
Files
memory/1152-0-0x0000000000E70000-0x0000000000F36000-memory.dmp
memory/1152-1-0x0000000074D20000-0x000000007540E000-memory.dmp
memory/1152-2-0x00000000007A0000-0x00000000007E0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpAE4B.tmp
| MD5 | c9ff7748d8fcef4cf84a5501e996a641 |
| SHA1 | 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9 |
| SHA256 | 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988 |
| SHA512 | d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73 |
memory/1152-12-0x0000000074D20000-0x000000007540E000-memory.dmp
memory/1152-13-0x00000000007A0000-0x00000000007E0000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-29 08:31
Reported
2024-04-29 08:33
Platform
win10v2004-20240419-en
Max time kernel
133s
Max time network
149s
Command Line
Signatures
SectopRAT
SectopRAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2d8c1cae9f4d8aeb07e4780ab7c21297.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2d8c1cae9f4d8aeb07e4780ab7c21297.exe
"C:\Users\Admin\AppData\Local\Temp\2d8c1cae9f4d8aeb07e4780ab7c21297.exe"
Network
| Country | Destination | Domain | Proto |
| NL | 185.73.125.96:15647 | tcp | |
| US | 8.8.8.8:53 | pastebin.com | udp |
| NL | 185.73.125.96:15647 | tcp | |
| US | 8.8.8.8:53 | pastebin.com | udp |
| NL | 185.73.125.96:15647 | tcp |
Files
memory/4924-0-0x0000000000D50000-0x0000000000E16000-memory.dmp
memory/4924-1-0x0000000075050000-0x0000000075800000-memory.dmp
memory/4924-2-0x00000000057B0000-0x0000000005842000-memory.dmp
memory/4924-3-0x0000000005E00000-0x00000000063A4000-memory.dmp
memory/4924-4-0x0000000005790000-0x00000000057A0000-memory.dmp
memory/4924-5-0x0000000005A20000-0x0000000005BE2000-memory.dmp
memory/4924-6-0x00000000058D0000-0x0000000005920000-memory.dmp
memory/4924-7-0x0000000075050000-0x0000000075800000-memory.dmp
memory/4924-8-0x0000000005790000-0x00000000057A0000-memory.dmp