General
-
Target
55.qty
-
Size
5.0MB
-
Sample
250402-y2cfqasyax
-
MD5
e58d905d9e1529e987c9a82a74ce29c9
-
SHA1
b305eef82dc620e836ada7b56de9e98b077bf118
-
SHA256
87f7e5081a34770f1277d101c4ae40126623195cbce621196bde10e46df704b1
-
SHA512
ff0d482d98676b1ffdfdb82ce7ba1327bde0d92deee583335ea5d93e7e8aa81aeae9b59753646fc4d12ee553e7254f654caffaee28d3756030912c7ce729ccfb
-
SSDEEP
98304:3Yqd1A4isy2+mnoWNO6wM8UBc9XzAwC2PBpQrkLa8:pZi6+LWNHwZUBcZzvPBpek
Static task
static1
Behavioral task
behavioral1
Sample
55.msi
Resource
win10v2004-20250313-en
Malware Config
Targets
-
-
Target
55.qty
-
Size
5.0MB
-
MD5
e58d905d9e1529e987c9a82a74ce29c9
-
SHA1
b305eef82dc620e836ada7b56de9e98b077bf118
-
SHA256
87f7e5081a34770f1277d101c4ae40126623195cbce621196bde10e46df704b1
-
SHA512
ff0d482d98676b1ffdfdb82ce7ba1327bde0d92deee583335ea5d93e7e8aa81aeae9b59753646fc4d12ee553e7254f654caffaee28d3756030912c7ce729ccfb
-
SSDEEP
98304:3Yqd1A4isy2+mnoWNO6wM8UBc9XzAwC2PBpQrkLa8:pZi6+LWNHwZUBcZzvPBpek
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-