General
-
Target
556608.zip
-
Size
1.5MB
-
Sample
241211-rp8j3awmds
-
MD5
41eba955dd47961daa9ccd1ad26cf47c
-
SHA1
1f282ec7791cb076387b4402ea231fc36dc79fc4
-
SHA256
57f8db0ed487432436fb954a5bd13004751fe23eaa55c4148f22567a4b7dc43a
-
SHA512
b351bd097c59878310896af18bc37ba3b74b8d4809dc786a086c3cf6c601d912e778b418e4da1d8fa015ee6a0aa4efcb97d8bf4d3d1d88208844327a861a3a5e
-
SSDEEP
24576:9YlLzil+C4I5AC0OerLmmWTq79ODsJl1UwGQQ/TrGiDQm7rJinKAfLgp7gR:9Yo+w2xNzF8DclNGnyvCwKAfMtM
Static task
static1
Behavioral task
behavioral1
Sample
556608.zip
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
556608.zip
-
Size
1.5MB
-
MD5
41eba955dd47961daa9ccd1ad26cf47c
-
SHA1
1f282ec7791cb076387b4402ea231fc36dc79fc4
-
SHA256
57f8db0ed487432436fb954a5bd13004751fe23eaa55c4148f22567a4b7dc43a
-
SHA512
b351bd097c59878310896af18bc37ba3b74b8d4809dc786a086c3cf6c601d912e778b418e4da1d8fa015ee6a0aa4efcb97d8bf4d3d1d88208844327a861a3a5e
-
SSDEEP
24576:9YlLzil+C4I5AC0OerLmmWTq79ODsJl1UwGQQ/TrGiDQm7rJinKAfLgp7gR:9Yo+w2xNzF8DclNGnyvCwKAfMtM
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
System Binary Proxy Execution: Regsvcs/Regasm
Abuse Regasm to proxy execution of malicious code.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-