General

  • Target

    KSCMWOLPRKU31OY0O7IA05ZD.exe

  • Size

    4.0MB

  • Sample

    250209-sb8tcavnf1

  • MD5

    0b32762b67c07329013d3b4f01b9f840

  • SHA1

    6cc1205ae97744ae4ebfed85577404a03e4d64f0

  • SHA256

    0b3a5a436be69f5e20ac0fd84dab58e27abb3cc5ecb821a182da5a3c25418feb

  • SHA512

    836d54d2ff9bec071c49746e23e82ff9bafc24547ffaad6c37d18b8b9eeab47f25dd8bf88217e02cef38e298be197714177774a37689c72022f5b1795cd85ae9

  • SSDEEP

    98304:vmH01flvieIOBNZSAHVnAELyOpGKOnxz9M5iCj:eUfhIOB/HVnfLyOOxB8vj

Malware Config

Targets

    • Target

      KSCMWOLPRKU31OY0O7IA05ZD.exe

    • Size

      4.0MB

    • MD5

      0b32762b67c07329013d3b4f01b9f840

    • SHA1

      6cc1205ae97744ae4ebfed85577404a03e4d64f0

    • SHA256

      0b3a5a436be69f5e20ac0fd84dab58e27abb3cc5ecb821a182da5a3c25418feb

    • SHA512

      836d54d2ff9bec071c49746e23e82ff9bafc24547ffaad6c37d18b8b9eeab47f25dd8bf88217e02cef38e298be197714177774a37689c72022f5b1795cd85ae9

    • SSDEEP

      98304:vmH01flvieIOBNZSAHVnAELyOpGKOnxz9M5iCj:eUfhIOB/HVnfLyOOxB8vj

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks