General

  • Target

    099a21ed3c029636ab7979495a13f0c9f5b170fd80c78be71b1fa19e17c9c744

  • Size

    1.9MB

  • Sample

    241109-v9p51axrdx

  • MD5

    081a051c0d6033e8e87ecb29b89e2453

  • SHA1

    862d6d5b7a71e57344887b46aeff81e52f3d7355

  • SHA256

    099a21ed3c029636ab7979495a13f0c9f5b170fd80c78be71b1fa19e17c9c744

  • SHA512

    91ef7feedf52f7d4f7249daee6d333396f65aadf14cfada8659f29a451726d85e978cd63666777b078451c92daa6782968cfb185c6efa66077da3f3fc081a2df

  • SSDEEP

    49152:hY8W02l7Ung8jt6HefYMIZuAiemwQn1cwjmsMuR+UZHLMW+FSF:htWllWht6NMkmFn16sMU+iHojFq

Malware Config

Targets

    • Target

      Zeno Zex.exe

    • Size

      1.9MB

    • MD5

      40bf9f5997db7c86960bb6dbf019ebd6

    • SHA1

      0d7bd4d8cc4eec98dcd4983137f8786baa8b6610

    • SHA256

      b94685d8c36817271046244e3a97d0574e06c411917ae4c9e5f9b43a1449679a

    • SHA512

      a199d517dd2910b24c52274eb5a7b469332e4139b50741c5730ae2bcd5bbc96cdf8e4ddbb2a8a2c2334e3c4ab02516f9b611899c3b2a82a007d1365e48596fb6

    • SSDEEP

      49152:dg7S1CK5GQNm4+Ua+WvGp0452WzKXkGoBUdG4r:Km1W+ba+WI04IWWLoB8Ga

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks