General

  • Target

    d8f02ea1a16fa39ab32b84265833164ff9606862e0dbd7da3f1b02b5210c69a3.zip

  • Size

    3.7MB

  • Sample

    250218-jnrk6aynbr

  • MD5

    2c3ff0d226cd1c8852e57bb9c4122022

  • SHA1

    f1c512f4175e0bb56bcda1a92ffe258bf1cef089

  • SHA256

    d8f02ea1a16fa39ab32b84265833164ff9606862e0dbd7da3f1b02b5210c69a3

  • SHA512

    a4ced4cdb2c2074a68584a7f6603c570b84ee9a64f7730fe0c817e5e21ca06c03ec1d77c2654160eb5573b9c3652521ba5c420079a1c240197122a9407235f9d

  • SSDEEP

    98304:GUK8mGIgurx7EoMIVG2UuIEWPinaJLLmlzNCSbwwp0vI:GUKNg2x7EIVGrXqnuCcuevI

Malware Config

Targets

    • Target

      Manifest/Compil32.exe

    • Size

      4.0MB

    • MD5

      20d23b37c54fc1434ff3105a165cdac7

    • SHA1

      9cb3811fb5f2ecacadc831d82e7e850abedc19ae

    • SHA256

      8fa9074cd74cbcedc44b12999dbc5f4e51ea82caa24be18b073686229f1f9db8

    • SHA512

      40eb9cc31a97996237e69d975efc1a3c22297403bef211427752926a331e9913801bacc7236e4a67ce988c110ccbda3dbd3e65bcc185d512cfc951b0e05fb409

    • SSDEEP

      98304:ByzK9w6TfpPaVG5I+Juv5380exR4KuNFL3N:QWViB3Mwx

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

    • Target

      Manifest/ISCmplr.dll

    • Size

      1.4MB

    • MD5

      4a6dbda25a80cbb1df9ce69ff6fa6303

    • SHA1

      d069c82c6b34b36d336c7b15bf0dae5410c8fd46

    • SHA256

      5bd542000aa5585f44e07ba88e0fb52660566209f76adf85926093446447b113

    • SHA512

      215287711399aa26ebcc5e300fb35487f32a7c1897e2158f00fa06764520890fb4d7670b275b1e48d763d950816519f79a491738794b7e417602f17e9634fe6b

    • SSDEEP

      24576:tvpC+mNgcRqRhfZJbeijupnY88z7XcjOROI:9Efg90tn8z0ORO

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks