General

  • Target

    f3cdfc7a451246dd0d35eda63d3fd14fda1d1fc8ee3ded445b0fa5d6c88673b4

  • Size

    1.1MB

  • Sample

    241109-r337havqfv

  • MD5

    824be04ebdd5b8204b8a3459101cf38c

  • SHA1

    a4b8040483b4b4b673094d9e05232a6c5267d943

  • SHA256

    f3cdfc7a451246dd0d35eda63d3fd14fda1d1fc8ee3ded445b0fa5d6c88673b4

  • SHA512

    3db964b52315232f333b8e921a0f3209688180a3263a458e1c58282380e81d04ef9342b9a7ba89d7d32e018d8ddda252236690493a7ac6f994c5ad506b437bc5

  • SSDEEP

    24576:Ijw1k7t0OIIkO31EsNu3rF1v4oQZwcVJfUjISyD7tc29Gi/2:NktrIIkhsNubFFxufGIS4W6xu

Malware Config

Targets

    • Target

      d102bfb3dcfaf41785bf6435b3bfafc5abb90f97bf9547276b052e5cb23754c0.exe

    • Size

      1.9MB

    • MD5

      99a080d5ff6e490cfeee2efea67db4b3

    • SHA1

      b47303eea93bc32a2a4c6ff8b9e330e8a93f86fc

    • SHA256

      d102bfb3dcfaf41785bf6435b3bfafc5abb90f97bf9547276b052e5cb23754c0

    • SHA512

      ccf566722025fba4d343a35060bc9d3c6aa0c5dd653587a4446617e59a7011d5a184729b1af25c4a36247d7b4f59376be6749888f0d6fbd8e650c027c6d13272

    • SSDEEP

      49152:PpOPiDj5rweFWONYxcSM/GJY0Wkh2VwTg:1X5rXWO7SM/GJYe

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks