General
-
Target
run.ps1
-
Size
78B
-
Sample
250219-15vsksslt7
-
MD5
ad7d32c157ff297097b71dad926dd515
-
SHA1
15904b197df005446e2adeb4d4786d23edd91e48
-
SHA256
3480c3e63090688dd4a92dd0e8cab335a6a177e1704f725b41d50baf875b67f4
-
SHA512
9cb9616edc4223dcbbbf7a5f4b43a4a5656912bf2510ef8e8cdf18786031b7c80e3e9cc19931b7046bb2b7d8a59bd3b8909699fd72bfce9865ffbcdb0ea20bbb
Static task
static1
Behavioral task
behavioral1
Sample
run.ps1
Resource
win7-20240903-en
Malware Config
Extracted
http://45.61.157.205/17/ten
Targets
-
-
Target
run.ps1
-
Size
78B
-
MD5
ad7d32c157ff297097b71dad926dd515
-
SHA1
15904b197df005446e2adeb4d4786d23edd91e48
-
SHA256
3480c3e63090688dd4a92dd0e8cab335a6a177e1704f725b41d50baf875b67f4
-
SHA512
9cb9616edc4223dcbbbf7a5f4b43a4a5656912bf2510ef8e8cdf18786031b7c80e3e9cc19931b7046bb2b7d8a59bd3b8909699fd72bfce9865ffbcdb0ea20bbb
-
SectopRAT payload
-
Sectoprat family
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-