General
-
Target
KSCMWOLPRKU31OY0O7IA05ZD.exe
-
Size
4.0MB
-
Sample
250209-sb8tcavnf1
-
MD5
0b32762b67c07329013d3b4f01b9f840
-
SHA1
6cc1205ae97744ae4ebfed85577404a03e4d64f0
-
SHA256
0b3a5a436be69f5e20ac0fd84dab58e27abb3cc5ecb821a182da5a3c25418feb
-
SHA512
836d54d2ff9bec071c49746e23e82ff9bafc24547ffaad6c37d18b8b9eeab47f25dd8bf88217e02cef38e298be197714177774a37689c72022f5b1795cd85ae9
-
SSDEEP
98304:vmH01flvieIOBNZSAHVnAELyOpGKOnxz9M5iCj:eUfhIOB/HVnfLyOOxB8vj
Static task
static1
Behavioral task
behavioral1
Sample
KSCMWOLPRKU31OY0O7IA05ZD.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
KSCMWOLPRKU31OY0O7IA05ZD.exe
-
Size
4.0MB
-
MD5
0b32762b67c07329013d3b4f01b9f840
-
SHA1
6cc1205ae97744ae4ebfed85577404a03e4d64f0
-
SHA256
0b3a5a436be69f5e20ac0fd84dab58e27abb3cc5ecb821a182da5a3c25418feb
-
SHA512
836d54d2ff9bec071c49746e23e82ff9bafc24547ffaad6c37d18b8b9eeab47f25dd8bf88217e02cef38e298be197714177774a37689c72022f5b1795cd85ae9
-
SSDEEP
98304:vmH01flvieIOBNZSAHVnAELyOpGKOnxz9M5iCj:eUfhIOB/HVnfLyOOxB8vj
-
SectopRAT payload
-
Sectoprat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1