General
-
Target
bc94d3e144094adfc05a04725116e9b740796a7591c771b62941a06aa6a96129.exe
-
Size
4.0MB
-
Sample
241115-vggyxsxjhy
-
MD5
29a2e4569a2eb8cab1be4d226784827e
-
SHA1
f79f2f382f3c1764b55aa160ecf6ed84358fb070
-
SHA256
bc94d3e144094adfc05a04725116e9b740796a7591c771b62941a06aa6a96129
-
SHA512
e205b3813619504eed8b4ae938fad247cb70e9172a15e32f64316bbc2afe225d7a9e7e3e1925bc9c35659b9f5e8b80012fc02bb24afe3d60fb8ef74a40a2e482
-
SSDEEP
49152:PjKdrRvp7grhJqZyc0PGMMlADKD7IRHxw:PjKdrRvJchJq6GPlA2D0RHxw
Static task
static1
Behavioral task
behavioral1
Sample
bc94d3e144094adfc05a04725116e9b740796a7591c771b62941a06aa6a96129.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
bc94d3e144094adfc05a04725116e9b740796a7591c771b62941a06aa6a96129.exe
-
Size
4.0MB
-
MD5
29a2e4569a2eb8cab1be4d226784827e
-
SHA1
f79f2f382f3c1764b55aa160ecf6ed84358fb070
-
SHA256
bc94d3e144094adfc05a04725116e9b740796a7591c771b62941a06aa6a96129
-
SHA512
e205b3813619504eed8b4ae938fad247cb70e9172a15e32f64316bbc2afe225d7a9e7e3e1925bc9c35659b9f5e8b80012fc02bb24afe3d60fb8ef74a40a2e482
-
SSDEEP
49152:PjKdrRvp7grhJqZyc0PGMMlADKD7IRHxw:PjKdrRvJchJq6GPlA2D0RHxw
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2