General

  • Target

    wEotIbaw.ps1

  • Size

    14.7MB

  • Sample

    250326-rl356sylv3

  • MD5

    995596f28f9a7d8543795fa3783c5417

  • SHA1

    26bdb7edbc54be02342dc1facb281059ac85d04d

  • SHA256

    8b3dcbc8862553bd18ae5f181f192bb76a5fe20dec5184383574a7e24701d8d8

  • SHA512

    daa12601f414d8f1d25d5ec32c9a3f4885a6aba35f60e72e6d414898e29ab6c378b175c3960261474641d6344475439dfc93e590274fc7fb79094ca093931a94

  • SSDEEP

    768:QbcXWHsPosaVp9Im/mwYljpGBQfANhIqnzK3edX7j8ASEz5pOgApo1n0aE1R74XL:QQ9kR

Malware Config

Targets

    • Target

      wEotIbaw.ps1

    • Size

      14.7MB

    • MD5

      995596f28f9a7d8543795fa3783c5417

    • SHA1

      26bdb7edbc54be02342dc1facb281059ac85d04d

    • SHA256

      8b3dcbc8862553bd18ae5f181f192bb76a5fe20dec5184383574a7e24701d8d8

    • SHA512

      daa12601f414d8f1d25d5ec32c9a3f4885a6aba35f60e72e6d414898e29ab6c378b175c3960261474641d6344475439dfc93e590274fc7fb79094ca093931a94

    • SSDEEP

      768:QbcXWHsPosaVp9Im/mwYljpGBQfANhIqnzK3edX7j8ASEz5pOgApo1n0aE1R74XL:QQ9kR

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks