General
-
Target
4350899d04502f9fb9ea63fda1820c5aea1d575f7893ef7edde5c661c5495b6b
-
Size
1.6MB
-
Sample
241128-y2143svkfp
-
MD5
4fabe26b8e5aafb4335ab4834eb83fbd
-
SHA1
f310621024ffaab61fb03bde7d63bb4c0c376ebb
-
SHA256
4350899d04502f9fb9ea63fda1820c5aea1d575f7893ef7edde5c661c5495b6b
-
SHA512
624863fabc15bd8846639a8524a01e9ef30d146e348cfee808cfe298e8c9e8ff61c57fb86e0f017623d27e413fdcd132c78df3308b35b2d5176430d556795b48
-
SSDEEP
24576:6C6SxJ8tzEnpouKAa3R3UGI2416CTLTrSPQt3jBoPCKMuLwYsRLoGBpuk:MdEnqAaR7IvTPrSAlKMvhJV
Static task
static1
Behavioral task
behavioral1
Sample
4350899d04502f9fb9ea63fda1820c5aea1d575f7893ef7edde5c661c5495b6b.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
4350899d04502f9fb9ea63fda1820c5aea1d575f7893ef7edde5c661c5495b6b
-
Size
1.6MB
-
MD5
4fabe26b8e5aafb4335ab4834eb83fbd
-
SHA1
f310621024ffaab61fb03bde7d63bb4c0c376ebb
-
SHA256
4350899d04502f9fb9ea63fda1820c5aea1d575f7893ef7edde5c661c5495b6b
-
SHA512
624863fabc15bd8846639a8524a01e9ef30d146e348cfee808cfe298e8c9e8ff61c57fb86e0f017623d27e413fdcd132c78df3308b35b2d5176430d556795b48
-
SSDEEP
24576:6C6SxJ8tzEnpouKAa3R3UGI2416CTLTrSPQt3jBoPCKMuLwYsRLoGBpuk:MdEnqAaR7IvTPrSAlKMvhJV
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2