General

  • Target

    07464bc3959038f221f36a5dfc72c4b1

  • Size

    1.1MB

  • Sample

    241111-mvlv2aybnl

  • MD5

    07464bc3959038f221f36a5dfc72c4b1

  • SHA1

    0e1bc7fb4c8ea82ed52179b5d6546312919543bd

  • SHA256

    544c37dcd4ca7c1a273deb467d8a123c7a53d83b7dc1a9a5c54cb58c15865c51

  • SHA512

    6a21cfa9be452001a6bd5302b8698a90e95671dfeaf1bdc345ceb8b6c7a31187c887e6c9b6a7948cbab190859fd97d2653d17b8f6999de0ff826d986ea1a23cb

  • SSDEEP

    24576:EAWc9blhTRU8LRJdTfa2ztkBAaZgBOMOMbd3OeqEI/YQlOJRqfWwd:OwJhTRUERJpa26riECbd3OeQ/ZlOOe8

Malware Config

Targets

    • Target

      d102bfb3dcfaf41785bf6435b3bfafc5abb90f97bf9547276b052e5cb23754c0.exe

    • Size

      1.9MB

    • MD5

      99a080d5ff6e490cfeee2efea67db4b3

    • SHA1

      b47303eea93bc32a2a4c6ff8b9e330e8a93f86fc

    • SHA256

      d102bfb3dcfaf41785bf6435b3bfafc5abb90f97bf9547276b052e5cb23754c0

    • SHA512

      ccf566722025fba4d343a35060bc9d3c6aa0c5dd653587a4446617e59a7011d5a184729b1af25c4a36247d7b4f59376be6749888f0d6fbd8e650c027c6d13272

    • SSDEEP

      49152:PpOPiDj5rweFWONYxcSM/GJY0Wkh2VwTg:1X5rXWO7SM/GJYe

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks