Resubmissions

15-02-2025 22:19

250215-18y96sxlbl 10

15-02-2025 18:28

250215-w4gr4syley 10

General

  • Target

    network_fix.msi

  • Size

    20.9MB

  • Sample

    250215-w4gr4syley

  • MD5

    2e857aab406f072738ef04bd18e8fc05

  • SHA1

    73e60b1a9ca549ff643301b91faa53c67fea7529

  • SHA256

    11a2c6854f88e833ac2fc1d4ddfe0b1ec64368a53ab3a60fe6f81e8ede764712

  • SHA512

    0672b64e53686f1cf53e9ab67e428a1afe9ba25de67996be098dcf5325b47c6d077cb7f5a40e4d6378e24bec32eb8f3b95ccff479e69116447b430f2b35c74f9

  • SSDEEP

    393216:bMabaNaYZEXw2rvHiNXvxDCjfxxeuBM7yLXgqjx6OeFJovR1zQz4lqsNCG/:IsYv27CNXifK7yrg9F2vR12s5/

Malware Config

Targets

    • Target

      network_fix.msi

    • Size

      20.9MB

    • MD5

      2e857aab406f072738ef04bd18e8fc05

    • SHA1

      73e60b1a9ca549ff643301b91faa53c67fea7529

    • SHA256

      11a2c6854f88e833ac2fc1d4ddfe0b1ec64368a53ab3a60fe6f81e8ede764712

    • SHA512

      0672b64e53686f1cf53e9ab67e428a1afe9ba25de67996be098dcf5325b47c6d077cb7f5a40e4d6378e24bec32eb8f3b95ccff479e69116447b430f2b35c74f9

    • SSDEEP

      393216:bMabaNaYZEXw2rvHiNXvxDCjfxxeuBM7yLXgqjx6OeFJovR1zQz4lqsNCG/:IsYv27CNXifK7yrg9F2vR12s5/

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks