General

  • Target

    232.exe

  • Size

    4.2MB

  • Sample

    240826-w7t7lsyeqg

  • MD5

    d9fc72797b06c9b700a6fed73d0304ef

  • SHA1

    c90f6ef5e0840f9aaec9a26b1d10fedaa731bad6

  • SHA256

    6abb9de7f6c663e542cd3d7b481b0907566f8c2acdacc6178091dacc7891d2b2

  • SHA512

    3f1038154efbc1920994fde7943ea28cbea723a752a38268e680745e2f7064aad31226f9ea8f9e92645340ba72ff4dd5acec35685dca5692a5ff34c4f9471b63

  • SSDEEP

    98304:tfUb4zBmhCaLVK80qY7sUljNFSytleS3dDp58/YLOYEEBPFg7:tfUsECEnUljNEyf5yVYTBe7

Malware Config

Targets

    • Target

      232.exe

    • Size

      4.2MB

    • MD5

      d9fc72797b06c9b700a6fed73d0304ef

    • SHA1

      c90f6ef5e0840f9aaec9a26b1d10fedaa731bad6

    • SHA256

      6abb9de7f6c663e542cd3d7b481b0907566f8c2acdacc6178091dacc7891d2b2

    • SHA512

      3f1038154efbc1920994fde7943ea28cbea723a752a38268e680745e2f7064aad31226f9ea8f9e92645340ba72ff4dd5acec35685dca5692a5ff34c4f9471b63

    • SSDEEP

      98304:tfUb4zBmhCaLVK80qY7sUljNFSytleS3dDp58/YLOYEEBPFg7:tfUsECEnUljNEyf5yVYTBe7

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks