General

  • Target

    1d40788ce56c4cafdd19ae5f2b567e51234a32fa179ec8fba45452dd46b4fab1.zip

  • Size

    13.5MB

  • Sample

    250126-wb6wjayraq

  • MD5

    6b1ee68cadbab6de0f2663bd392a9391

  • SHA1

    d680c8d2c0dbba134ca82a1f311f1848f35bdf3b

  • SHA256

    32d99ee71599789976145daba9369225e327d66698fd2d926e4aa5254137f9fd

  • SHA512

    2370fca662113f330c57c5965657028bf2e193a5f4feb05f3b5cb1e098f418faa864c77ab55904853e27e68e8dbf8bc14a4d8304f18a80cbcc082b01ba71bdf6

  • SSDEEP

    393216:G+Up13SkQwsQ0bq58Qef4UjlfKIXRzv3lsVr:43DQKv8VlyIlv3iR

Malware Config

Targets

    • Target

      1d40788ce56c4cafdd19ae5f2b567e51234a32fa179ec8fba45452dd46b4fab1.exe

    • Size

      13.9MB

    • MD5

      4d8e624f384094c048f779b9bb94a3bb

    • SHA1

      d81dca9f8165c915d88c9cc4c645f296198dc95e

    • SHA256

      1d40788ce56c4cafdd19ae5f2b567e51234a32fa179ec8fba45452dd46b4fab1

    • SHA512

      ae0294b02a073cff03d0272c74da2157807305d38993b91285a29b7ae000600324ae822fe6ee1e5986a87fdd7838979d84eda9d6b2499b28000f5d7586d34c47

    • SSDEEP

      196608:fqzd1L5Rbl1d363KTzuZhd1L5Rbl1d363KvhA54CbkAX//:yd1L51JfzuZhd1L51JS4CbkAH

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks