General
-
Target
107.exe
-
Size
3.9MB
-
Sample
241019-bz81ks1ekk
-
MD5
468bbc70a56325cc39d82e796879faa2
-
SHA1
5488f804a50f35be53fbf646ecb75d0211f180f3
-
SHA256
4732e7bbf0eb82ab024b4758bab398bb45320f45dbec2073bda054cce01b6d61
-
SHA512
a133fb50cdfbd9e74b6e8ba3d63819e70eba4f57ac47e8a26780074613bf94eb74971bd46906e1b395c4df27d77a9fcf66f4d777df65da5cca23b5d1c5277152
-
SSDEEP
49152:PuyQz1ISCnS/djRooJTK7sY7vvvUcwAfUOoYaKggtMt+tK+7xzy1AyBS9oZcTCIF:P81ISCnqjn7Y7v3UcwOwwVpu
Static task
static1
Behavioral task
behavioral1
Sample
107.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
107.exe
-
Size
3.9MB
-
MD5
468bbc70a56325cc39d82e796879faa2
-
SHA1
5488f804a50f35be53fbf646ecb75d0211f180f3
-
SHA256
4732e7bbf0eb82ab024b4758bab398bb45320f45dbec2073bda054cce01b6d61
-
SHA512
a133fb50cdfbd9e74b6e8ba3d63819e70eba4f57ac47e8a26780074613bf94eb74971bd46906e1b395c4df27d77a9fcf66f4d777df65da5cca23b5d1c5277152
-
SSDEEP
49152:PuyQz1ISCnS/djRooJTK7sY7vvvUcwAfUOoYaKggtMt+tK+7xzy1AyBS9oZcTCIF:P81ISCnqjn7Y7v3UcwOwwVpu
-
SectopRAT payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-