General
-
Target
SLAGGGLX.msi
-
Size
6.2MB
-
Sample
250407-phwktayxds
-
MD5
e1b11ab17b672dc15339a4eea17d3be7
-
SHA1
7dd1111c168f544929caf7e1ba8b2d790aa5ce77
-
SHA256
7a79c311f24811999c14cef556da34f933dfd82b1a568b064034634941314369
-
SHA512
37e2a1d26a6386e25fff7cd6e23742565f96fdcf6967e953d5767a3d4378a26bf9959c4ab4c38401f79812ff395ee9b907eea93917b8d2035971869db17fffc1
-
SSDEEP
98304:TRJYyhT6Sug1IPY2hiLOORwc3xyoZMEHGgS6y4wi36gZByUBXGo7FQ3:t9GjoKo/S6y4ZdZsUBXGYQ3
Behavioral task
behavioral1
Sample
SLAGGGLX.msi
Resource
win10v2004-20250314-en
Malware Config
Extracted
hijackloader
-
directory
%APPDATA%\Protectchrome_beta
-
inject_dll
%windir%\SysWOW64\pla.dll
Targets
-
-
Target
SLAGGGLX.msi
-
Size
6.2MB
-
MD5
e1b11ab17b672dc15339a4eea17d3be7
-
SHA1
7dd1111c168f544929caf7e1ba8b2d790aa5ce77
-
SHA256
7a79c311f24811999c14cef556da34f933dfd82b1a568b064034634941314369
-
SHA512
37e2a1d26a6386e25fff7cd6e23742565f96fdcf6967e953d5767a3d4378a26bf9959c4ab4c38401f79812ff395ee9b907eea93917b8d2035971869db17fffc1
-
SSDEEP
98304:TRJYyhT6Sug1IPY2hiLOORwc3xyoZMEHGgS6y4wi36gZByUBXGo7FQ3:t9GjoKo/S6y4ZdZsUBXGYQ3
-
SectopRAT payload
-
Sectoprat family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-