General

  • Target

    64aa1bf54917a57a946753e077a17fbe3e2a5957d21eaf47a808ac87bbfa77d5.msi

  • Size

    52.9MB

  • Sample

    250128-md8y8swkar

  • MD5

    dee1cb66fe01d38563456233fd99f84e

  • SHA1

    2dc8c5665574ca781d0deb31e9cfa326b4589340

  • SHA256

    64aa1bf54917a57a946753e077a17fbe3e2a5957d21eaf47a808ac87bbfa77d5

  • SHA512

    04a731d29388c1bade0d9f3839588e15621d7ad2daa1db290ae1c1947a72ab2176dcbf5dfd79702e602eccb29a981a363eb64821fc586f468bda7cfe3130e1dc

  • SSDEEP

    1572864:cP0B9hWc38EJOa1xbi+823n84w96uSryj6ZgykS+VOT:A0ThnBJi+82384e6uSryml+IT

Malware Config

Targets

    • Target

      64aa1bf54917a57a946753e077a17fbe3e2a5957d21eaf47a808ac87bbfa77d5.msi

    • Size

      52.9MB

    • MD5

      dee1cb66fe01d38563456233fd99f84e

    • SHA1

      2dc8c5665574ca781d0deb31e9cfa326b4589340

    • SHA256

      64aa1bf54917a57a946753e077a17fbe3e2a5957d21eaf47a808ac87bbfa77d5

    • SHA512

      04a731d29388c1bade0d9f3839588e15621d7ad2daa1db290ae1c1947a72ab2176dcbf5dfd79702e602eccb29a981a363eb64821fc586f468bda7cfe3130e1dc

    • SSDEEP

      1572864:cP0B9hWc38EJOa1xbi+823n84w96uSryj6ZgykS+VOT:A0ThnBJi+82384e6uSryml+IT

    • NetSupport

      NetSupport is a remote access tool sold as a legitimate system administration software.

    • Netsupport family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Drops startup file

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks