General
-
Target
data
-
Size
81.2MB
-
Sample
241128-s4cllsxmhq
-
MD5
7a71caee51f0980b56420e3a49d2778e
-
SHA1
4827b90daf016b1bb2a07edcc65bad5639d2df69
-
SHA256
7058adbf8289fc200e94acbca32c23cb0dce33bd3bd29c10e0a900a109828342
-
SHA512
9bc6f0fc1d5f3ec1d9fd29723b8fed72671b82fa20387b345d4d14b6c1032aca2fb7353730764c2ac5fe7b3e6dfcf4ebc0e9dbc4c9ed98c1a869b60ed3d41ed3
-
SSDEEP
1572864:Db2bBvAXX++3yEbvFtg8qsRfbMi63N4XZX6jSHREle440fzKM4qt:DUAX7xTkEdO3NkkCREk44qKS
Static task
static1
Behavioral task
behavioral1
Sample
data.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
data
-
Size
81.2MB
-
MD5
7a71caee51f0980b56420e3a49d2778e
-
SHA1
4827b90daf016b1bb2a07edcc65bad5639d2df69
-
SHA256
7058adbf8289fc200e94acbca32c23cb0dce33bd3bd29c10e0a900a109828342
-
SHA512
9bc6f0fc1d5f3ec1d9fd29723b8fed72671b82fa20387b345d4d14b6c1032aca2fb7353730764c2ac5fe7b3e6dfcf4ebc0e9dbc4c9ed98c1a869b60ed3d41ed3
-
SSDEEP
1572864:Db2bBvAXX++3yEbvFtg8qsRfbMi63N4XZX6jSHREle440fzKM4qt:DUAX7xTkEdO3NkkCREk44qKS
-
SectopRAT payload
-
Sectoprat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-