General

  • Target

    44997a5aa2709c2cef26ea501d4f01140d34b59f0fd182282354598eef4b224b.exe

  • Size

    6.5MB

  • Sample

    241123-cs8xns1qep

  • MD5

    bfc5ea31b4aeefec1508e8f5b458e574

  • SHA1

    976fe53a467068719f70a856dca3bb7b65a9d6dc

  • SHA256

    44997a5aa2709c2cef26ea501d4f01140d34b59f0fd182282354598eef4b224b

  • SHA512

    146ef0163df8be2c8e5a834c27d731c817e0540a30d4e4746109fd564c33d2d7f00560017f0d5b9ade9eea05611ed440f64022f97e30949e5bb58041452f590e

  • SSDEEP

    98304:vi0rHj8I5IxALsFFyTFaYTXMHyAw8aMAKa392mAYYqUSoYTk0KGjp2kizn:vi0rDyraTFNKyLUAKw2B7qUShTkQjDir

Malware Config

Targets

    • Target

      44997a5aa2709c2cef26ea501d4f01140d34b59f0fd182282354598eef4b224b.exe

    • Size

      6.5MB

    • MD5

      bfc5ea31b4aeefec1508e8f5b458e574

    • SHA1

      976fe53a467068719f70a856dca3bb7b65a9d6dc

    • SHA256

      44997a5aa2709c2cef26ea501d4f01140d34b59f0fd182282354598eef4b224b

    • SHA512

      146ef0163df8be2c8e5a834c27d731c817e0540a30d4e4746109fd564c33d2d7f00560017f0d5b9ade9eea05611ed440f64022f97e30949e5bb58041452f590e

    • SSDEEP

      98304:vi0rHj8I5IxALsFFyTFaYTXMHyAw8aMAKa392mAYYqUSoYTk0KGjp2kizn:vi0rDyraTFNKyLUAKw2B7qUShTkQjDir

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks