General

  • Target

    d9fc72797b06c9b700a6fed73d0304ef.bin

  • Size

    4.0MB

  • Sample

    240825-cbxhbatcnm

  • MD5

    bfd78e7bb9a09e1054ee87ad5994d989

  • SHA1

    404372057019e6ad695b27cabfeaf5f8b9f59fff

  • SHA256

    aa608ccff0192067ae5ac5382df40a26c099711b12b5fea0bc42a16508105c98

  • SHA512

    b6ba88fe7048ffdaf246f18e220203593f8a25026b89c8358f9007cacbc31957bf458a863233506717cc5e8e09661f28a687302a115cf8ccc2add65932076e80

  • SSDEEP

    98304:6pZ3sNZ6UYo15cHVcf9pp+XVEtNLygpTjgzqipsm4ssyFR:6peZCe5aAEXg5zpTjisHssK

Malware Config

Targets

    • Target

      6abb9de7f6c663e542cd3d7b481b0907566f8c2acdacc6178091dacc7891d2b2.exe

    • Size

      4.2MB

    • MD5

      d9fc72797b06c9b700a6fed73d0304ef

    • SHA1

      c90f6ef5e0840f9aaec9a26b1d10fedaa731bad6

    • SHA256

      6abb9de7f6c663e542cd3d7b481b0907566f8c2acdacc6178091dacc7891d2b2

    • SHA512

      3f1038154efbc1920994fde7943ea28cbea723a752a38268e680745e2f7064aad31226f9ea8f9e92645340ba72ff4dd5acec35685dca5692a5ff34c4f9471b63

    • SSDEEP

      98304:tfUb4zBmhCaLVK80qY7sUljNFSytleS3dDp58/YLOYEEBPFg7:tfUsECEnUljNEyf5yVYTBe7

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks