General

  • Target

    107789c37f85315b60b467dfc00d9473092959adfbfe736515b8d14ca99f67a5

  • Size

    3.0MB

  • Sample

    241109-3jg1psvbnm

  • MD5

    67af1747e08344eae77a38e2b6a10315

  • SHA1

    7f13fa25bed5e28f874842f18c9948f584b8463a

  • SHA256

    107789c37f85315b60b467dfc00d9473092959adfbfe736515b8d14ca99f67a5

  • SHA512

    72695d08c852663c61bfa0a83b06a02b49a885c4ca026f7a7f8c34dae49d77418b60f5e8f4b31982aa1b7feec7bc6a59b8ec1bde8cfff9cdb2521b8293159d75

  • SSDEEP

    49152:Q0LXPDkB8XjKjQxY1MoEd37l+frNnG9mQBw1yqL7KgmrQrweNrWZjVPD7k+X:QaXromjKljc7l+frNSmQBw1fLRxrvNyR

Malware Config

Targets

    • Target

      9b2e71d1d534f802cae86df5471e0a2093f3d2188fa3188fbbc34fa1ce920568

    • Size

      3.0MB

    • MD5

      df26cb0b6c9228598caf0311b1d90fbb

    • SHA1

      6b3437c2ff09e90794c8c0fde9ef16fd0531b95e

    • SHA256

      9b2e71d1d534f802cae86df5471e0a2093f3d2188fa3188fbbc34fa1ce920568

    • SHA512

      1d766a6648b5cbdd4047d4b27704338e159b7031953dae2bc623d530cc1ce3b96e519fc7aa9a823a80487382ce4486b9886027d819cd012ea53bcd5ff7949f91

    • SSDEEP

      49152:FVrKfpKFsjWGcfgFzKNAdVEaPLMNeG9fyYKxyB/efz8gAnV1ye:FGj1NKN02aTtG9c8GIgAVh

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks