General
-
Target
b.exe
-
Size
3.0MB
-
Sample
241202-xlsmbstjdk
-
MD5
1c7a29f48b56d6e89620c0c55d515095
-
SHA1
6362eed3be15d632ce62400a159f483e1ffd7610
-
SHA256
ffd45c2b562d30113cb9a4823025a9a162503017e9d81fd96ddb5b98e5bb89bd
-
SHA512
16c1e03386e289a4a5aa24190d2c6ad05f87a657d92a210e0d6aecb5afaf5bfac1654437c780d2a4d8d9a9212c67a387d66a9f12a71756331fe0246035496b48
-
SSDEEP
98304:v6rcWNztTkmXubthKXwkgzdXqS/jwHxMz9IPctmZS:SrLNvubthKXxCaLM+Pctq
Behavioral task
behavioral1
Sample
b.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
b.exe
-
Size
3.0MB
-
MD5
1c7a29f48b56d6e89620c0c55d515095
-
SHA1
6362eed3be15d632ce62400a159f483e1ffd7610
-
SHA256
ffd45c2b562d30113cb9a4823025a9a162503017e9d81fd96ddb5b98e5bb89bd
-
SHA512
16c1e03386e289a4a5aa24190d2c6ad05f87a657d92a210e0d6aecb5afaf5bfac1654437c780d2a4d8d9a9212c67a387d66a9f12a71756331fe0246035496b48
-
SSDEEP
98304:v6rcWNztTkmXubthKXwkgzdXqS/jwHxMz9IPctmZS:SrLNvubthKXxCaLM+Pctq
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-