General

  • Target

    sectoprat.exe

  • Size

    496KB

  • Sample

    241118-xc6gtssenh

  • MD5

    191dd7393cac9cfa620ff5098a7c8b57

  • SHA1

    a1d15bdc1565667a3b2baea49370b8e00338cbc3

  • SHA256

    dc9f46bbf54d2f02111cea740cd4071246b2123348d0c5ff4f6df81dc672d00e

  • SHA512

    c81e7ab85d0b458eb497feb5f031b28c2746a62f69aec7293caad77060e69018feb583c407edda7525195308ec9b7b2340c44a97fa954d0a871aebad18fa5a33

  • SSDEEP

    6144:7lBYO4yjEb17TcMz5/hQluj0oGWA9HowGD9kh0vIOnP09Xlz34bKeA68tZTOaoWm:haO4Xb1740ZDw+vIcs9Xlz1E8tF

Malware Config

Targets

    • Target

      sectoprat.exe

    • Size

      496KB

    • MD5

      191dd7393cac9cfa620ff5098a7c8b57

    • SHA1

      a1d15bdc1565667a3b2baea49370b8e00338cbc3

    • SHA256

      dc9f46bbf54d2f02111cea740cd4071246b2123348d0c5ff4f6df81dc672d00e

    • SHA512

      c81e7ab85d0b458eb497feb5f031b28c2746a62f69aec7293caad77060e69018feb583c407edda7525195308ec9b7b2340c44a97fa954d0a871aebad18fa5a33

    • SSDEEP

      6144:7lBYO4yjEb17TcMz5/hQluj0oGWA9HowGD9kh0vIOnP09Xlz34bKeA68tZTOaoWm:haO4Xb1740ZDw+vIcs9Xlz1E8tF

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks