General
-
Target
a42611665806c5056faf4d5cfeadf98878d8132243b2097ef13ba7fcfab22c0b.zip
-
Size
4.1MB
-
Sample
241128-vjh9rstmfz
-
MD5
e2066ae0be02db87ec6267234b0ea65a
-
SHA1
24e0b6e9fc90f9b673f1d7fe17d920bd857c776f
-
SHA256
a42611665806c5056faf4d5cfeadf98878d8132243b2097ef13ba7fcfab22c0b
-
SHA512
78ab67e046d3cd93ea18cbc6e0399232458eb71e3879dfaab7163f6a230cca2ada609af6bcc92685e1bf2c9b7ebf2b66af4ce68c581678421b6b635e2d7572b9
-
SSDEEP
98304:ZVVtbM83oo5aIvS5UO6eoVRi9nrVbfdGPc3xz+l:fVtbMKogaIvS5lX/GMo
Static task
static1
Behavioral task
behavioral1
Sample
dobi.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
dobi.exe
-
Size
9.6MB
-
MD5
a439025e40533f6e78c74fe8e9ce9875
-
SHA1
6ae40c35d089fd05b521affda29c205effdf9928
-
SHA256
a15ddd90e6ad35fc8896d7d613d0d178bdc29a9353128e6b5b4e177abcb8195f
-
SHA512
a2e22c32a1b6c50cfef234a7fe9581df516d3b7129645d64ffb16652a4dc757294aa5ccdae2a3c1a530c71251abeeb73356ca4f6b33b73fdd7cac2161a16d84b
-
SSDEEP
98304:RkLpZuLG6phE8B5ICZu0yYfq3TTLJB7foR:6Lp4GeENIKYR
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-