General
-
Target
164.zip
-
Size
67.3MB
-
Sample
240517-qcva8sac2y
-
MD5
3e4f9eab6576f7262ecb93e395757b28
-
SHA1
d3cb8cd0ad0da03914553b8ec7626780f69703a5
-
SHA256
fa0b3328dda7aa7e953780fc8b6be127f747fc778f0bd3f0a2e885402c1c481e
-
SHA512
05c60630a96c046a0a0644404dd7be07563055104648a60d55dba0ccc01e97c0c958fc63225007ee63ec0d3df7d8f8d62807288dabce1c036b040900668f1dae
-
SSDEEP
1572864:vfEN10yY9MJB6MxjUg2sNgw0/HFnQPwKwtIGks8BU1NtLv/t/ot9:XE/0yYKv6MXBN10/HKPwKqwgtLXSt9
Static task
static1
Behavioral task
behavioral1
Sample
164/setup164.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
164/setup164.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
164/setup164.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
164/setup164.exe
Resource
win11-20240426-en
Malware Config
Targets
-
-
Target
164/setup164.exe
-
Size
32KB
-
MD5
2b8b61308a4482526a259ccab970bfd6
-
SHA1
b41513afc20d492b556eb2f0ed2bd3af9e7b496c
-
SHA256
09ad227263cf701b1ee840b6744be44e1bf2478073c20b5dfc8dd29fecade71b
-
SHA512
b88a63c46062d3c6a608bc650d82a4b7e69e284a72655de6e5249060acba9a566287256b80afd0197ed6f903a9bf19c6e5c4565bb5bdb1bb4cfd64281bdb6324
-
SSDEEP
384:7oI1gYZw33FUWUcC6TBhdsDgZH4o5NEvdlcn0ScPmPn0Avsl9EPg/s4Xsn+KvHKj:j7Zw33FNUf6Nhd/fQ1l+0vM0iT9
-
SectopRAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-