General
-
Target
network_fix.msi
-
Size
20.9MB
-
Sample
250215-18y96sxlbl
-
MD5
2e857aab406f072738ef04bd18e8fc05
-
SHA1
73e60b1a9ca549ff643301b91faa53c67fea7529
-
SHA256
11a2c6854f88e833ac2fc1d4ddfe0b1ec64368a53ab3a60fe6f81e8ede764712
-
SHA512
0672b64e53686f1cf53e9ab67e428a1afe9ba25de67996be098dcf5325b47c6d077cb7f5a40e4d6378e24bec32eb8f3b95ccff479e69116447b430f2b35c74f9
-
SSDEEP
393216:bMabaNaYZEXw2rvHiNXvxDCjfxxeuBM7yLXgqjx6OeFJovR1zQz4lqsNCG/:IsYv27CNXifK7yrg9F2vR12s5/
Static task
static1
Behavioral task
behavioral1
Sample
network_fix.msi
Resource
win11-20250211-en
Malware Config
Targets
-
-
Target
network_fix.msi
-
Size
20.9MB
-
MD5
2e857aab406f072738ef04bd18e8fc05
-
SHA1
73e60b1a9ca549ff643301b91faa53c67fea7529
-
SHA256
11a2c6854f88e833ac2fc1d4ddfe0b1ec64368a53ab3a60fe6f81e8ede764712
-
SHA512
0672b64e53686f1cf53e9ab67e428a1afe9ba25de67996be098dcf5325b47c6d077cb7f5a40e4d6378e24bec32eb8f3b95ccff479e69116447b430f2b35c74f9
-
SSDEEP
393216:bMabaNaYZEXw2rvHiNXvxDCjfxxeuBM7yLXgqjx6OeFJovR1zQz4lqsNCG/:IsYv27CNXifK7yrg9F2vR12s5/
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2