General

  • Target

    a3f9325c5abd9c0338f6e271b1cbf0536dcbeb551ec64b98c07e77bea0b19254N

  • Size

    3.6MB

  • Sample

    250113-e45eqswkez

  • MD5

    5a42c717fe30a7f6ab4a9b8e20010c70

  • SHA1

    be50c596abbdbbc67866bd490cec2f804a060a74

  • SHA256

    a3f9325c5abd9c0338f6e271b1cbf0536dcbeb551ec64b98c07e77bea0b19254

  • SHA512

    46f32f5fd768abd8193ba02d44650d50c03f3bc240342cf5b0a4f79619e256935bd2eee4c24cded7e2776c2a4c42e01e50f5f6cb2c09df137b7f4b99250c2036

  • SSDEEP

    98304:SwRElZ33Li0XUU3FMi9+Q4m1PQKq39swQHx:ufnGcUU0xm1Psmlx

Malware Config

Targets

    • Target

      a3f9325c5abd9c0338f6e271b1cbf0536dcbeb551ec64b98c07e77bea0b19254N

    • Size

      3.6MB

    • MD5

      5a42c717fe30a7f6ab4a9b8e20010c70

    • SHA1

      be50c596abbdbbc67866bd490cec2f804a060a74

    • SHA256

      a3f9325c5abd9c0338f6e271b1cbf0536dcbeb551ec64b98c07e77bea0b19254

    • SHA512

      46f32f5fd768abd8193ba02d44650d50c03f3bc240342cf5b0a4f79619e256935bd2eee4c24cded7e2776c2a4c42e01e50f5f6cb2c09df137b7f4b99250c2036

    • SSDEEP

      98304:SwRElZ33Li0XUU3FMi9+Q4m1PQKq39swQHx:ufnGcUU0xm1Psmlx

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks