General
-
Target
275d3ee9353b7a6061c2fc0582d0a9b209ef04c761668224ca7bf63483f9521f
-
Size
2.2MB
-
Sample
250217-t4t2bs1px9
-
MD5
86eb7ac6ee390aa1c07d4bc780b42a8f
-
SHA1
6851be7b2ddc1311a9b3001676c90d9cdce843f9
-
SHA256
275d3ee9353b7a6061c2fc0582d0a9b209ef04c761668224ca7bf63483f9521f
-
SHA512
636050ba9e601fb1122430f05a1976bc2f4851bb15aeb79d6529ab5353e4b4754c5f0f4cb9a5cdc594cdd59a131b915ded304b2db4c23bd8b19080bae34471cc
-
SSDEEP
49152:4z4ssKKlbM+3P+CWo616eRoqFV3UVGb5N6jLliLBJoaSX32:4bKy+3GC6dRHFZfbXSa62
Static task
static1
Behavioral task
behavioral1
Sample
pica.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
pica.exe
-
Size
40.0MB
-
MD5
30ad2c460bec3cec4078de57849e76c8
-
SHA1
86455b67f56495bbb5efa2bf19b4824c77e432b4
-
SHA256
aabac842ff753a562b44874af5a849db7df6c1d79678c2c5e746aa3c9ade35c3
-
SHA512
e873e4b2d7ca5df411efa2e3a13159387ad419050bf6d64e0a8151763aeb725446df3713deed736990693e916166093b05a6d74371d6516356feb169df854910
-
SSDEEP
98304:rRq0X6DOzl4pysJwWVNUK1oiUf4EdbldN+VNQo:bXoysJwWXUKa4EvdmQo
-
SectopRAT payload
-
Sectoprat family
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-