General

  • Target

    55.qty

  • Size

    5.0MB

  • Sample

    250402-ynb8ssvpx8

  • MD5

    e58d905d9e1529e987c9a82a74ce29c9

  • SHA1

    b305eef82dc620e836ada7b56de9e98b077bf118

  • SHA256

    87f7e5081a34770f1277d101c4ae40126623195cbce621196bde10e46df704b1

  • SHA512

    ff0d482d98676b1ffdfdb82ce7ba1327bde0d92deee583335ea5d93e7e8aa81aeae9b59753646fc4d12ee553e7254f654caffaee28d3756030912c7ce729ccfb

  • SSDEEP

    98304:3Yqd1A4isy2+mnoWNO6wM8UBc9XzAwC2PBpQrkLa8:pZi6+LWNHwZUBcZzvPBpek

Malware Config

Targets

    • Target

      55.qty

    • Size

      5.0MB

    • MD5

      e58d905d9e1529e987c9a82a74ce29c9

    • SHA1

      b305eef82dc620e836ada7b56de9e98b077bf118

    • SHA256

      87f7e5081a34770f1277d101c4ae40126623195cbce621196bde10e46df704b1

    • SHA512

      ff0d482d98676b1ffdfdb82ce7ba1327bde0d92deee583335ea5d93e7e8aa81aeae9b59753646fc4d12ee553e7254f654caffaee28d3756030912c7ce729ccfb

    • SSDEEP

      98304:3Yqd1A4isy2+mnoWNO6wM8UBc9XzAwC2PBpQrkLa8:pZi6+LWNHwZUBcZzvPBpek

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.