General
-
Target
wEotIbaw.ps1
-
Size
14.7MB
-
Sample
250326-rl356sylv3
-
MD5
995596f28f9a7d8543795fa3783c5417
-
SHA1
26bdb7edbc54be02342dc1facb281059ac85d04d
-
SHA256
8b3dcbc8862553bd18ae5f181f192bb76a5fe20dec5184383574a7e24701d8d8
-
SHA512
daa12601f414d8f1d25d5ec32c9a3f4885a6aba35f60e72e6d414898e29ab6c378b175c3960261474641d6344475439dfc93e590274fc7fb79094ca093931a94
-
SSDEEP
768:QbcXWHsPosaVp9Im/mwYljpGBQfANhIqnzK3edX7j8ASEz5pOgApo1n0aE1R74XL:QQ9kR
Static task
static1
Behavioral task
behavioral1
Sample
wEotIbaw.ps1
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
wEotIbaw.ps1
-
Size
14.7MB
-
MD5
995596f28f9a7d8543795fa3783c5417
-
SHA1
26bdb7edbc54be02342dc1facb281059ac85d04d
-
SHA256
8b3dcbc8862553bd18ae5f181f192bb76a5fe20dec5184383574a7e24701d8d8
-
SHA512
daa12601f414d8f1d25d5ec32c9a3f4885a6aba35f60e72e6d414898e29ab6c378b175c3960261474641d6344475439dfc93e590274fc7fb79094ca093931a94
-
SSDEEP
768:QbcXWHsPosaVp9Im/mwYljpGBQfANhIqnzK3edX7j8ASEz5pOgApo1n0aE1R74XL:QQ9kR
-
SectopRAT payload
-
Sectoprat family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1