General
-
Target
pdScript.exe
-
Size
3.2MB
-
Sample
240702-wqy48svbmd
-
MD5
d464091627b9892b52f3f62fa3a03264
-
SHA1
85617122af6e94afada156fbe577bc59ca9dca8f
-
SHA256
de2b6a281000101e51a1848ea5ae9526355d749ca8095b25ce0b43b8641d4a63
-
SHA512
290bbe3de0051f9c29049fedf259cf3cb4d1b3015c468e7d5e93cbee11534f1f920b18b49363864d3f367590ec7342ba800cd988ac98db081271c3b76726e21c
-
SSDEEP
49152:NI9+2qYtQ/Rg2ECNUg2I7wUpEroPeeegawQTCIyVM8OoJNY:Sg21t0q2ECNURoPblawXIyXOoc
Static task
static1
Behavioral task
behavioral1
Sample
pdScript.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
pdScript.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
pdScript.exe
-
Size
3.2MB
-
MD5
d464091627b9892b52f3f62fa3a03264
-
SHA1
85617122af6e94afada156fbe577bc59ca9dca8f
-
SHA256
de2b6a281000101e51a1848ea5ae9526355d749ca8095b25ce0b43b8641d4a63
-
SHA512
290bbe3de0051f9c29049fedf259cf3cb4d1b3015c468e7d5e93cbee11534f1f920b18b49363864d3f367590ec7342ba800cd988ac98db081271c3b76726e21c
-
SSDEEP
49152:NI9+2qYtQ/Rg2ECNUg2I7wUpEroPeeegawQTCIyVM8OoJNY:Sg21t0q2ECNURoPblawXIyXOoc
-
SectopRAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-