General
-
Target
2223A0C17BC8EC63CD6D3647995978E9.exe
-
Size
1.6MB
-
Sample
241026-vef9lstpgm
-
MD5
2223a0c17bc8ec63cd6d3647995978e9
-
SHA1
c58e7e26863a557c820515a0eaa5fd5c9d56d0dc
-
SHA256
8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31
-
SHA512
9028d4ff22e59be9d16e3ebd4b3e3a9c1a22a4d272a7840aae55fb3614b3e008409684e9d229ac979244db0212e768255c0e7202f6f0e6fbf49ec92d2a31ea1a
-
SSDEEP
49152:4IGLOBaxpDPkpx+8dV7YrrofrpR44cGwNPz6CL:JGLOBa3DspZokf1e49wNn
Static task
static1
Behavioral task
behavioral1
Sample
2223A0C17BC8EC63CD6D3647995978E9.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2223A0C17BC8EC63CD6D3647995978E9.exe
-
Size
1.6MB
-
MD5
2223a0c17bc8ec63cd6d3647995978e9
-
SHA1
c58e7e26863a557c820515a0eaa5fd5c9d56d0dc
-
SHA256
8ae2402f1925ee78bdf48ce3cf3e7eebecaaf26c4a45ccc105d6beb735657f31
-
SHA512
9028d4ff22e59be9d16e3ebd4b3e3a9c1a22a4d272a7840aae55fb3614b3e008409684e9d229ac979244db0212e768255c0e7202f6f0e6fbf49ec92d2a31ea1a
-
SSDEEP
49152:4IGLOBaxpDPkpx+8dV7YrrofrpR44cGwNPz6CL:JGLOBa3DspZokf1e49wNn
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2