General

  • Target

    msi (3).msi

  • Size

    6.2MB

  • Sample

    250407-pjfkzsyxew

  • MD5

    a65e06ab79f119377a2c92fcecc00dfe

  • SHA1

    4c3fc302743879aa9713540ce33c78ba12b703e4

  • SHA256

    2884419e86608068c59c4352cb7c9472de27549d4710e8ccb2127ac0464e4931

  • SHA512

    98cf6349bff180bd19d227d2cb27d69fe17cf04743fce479a25e7d72c930d7028f90f06ba274207913074fb5251a8bd92a315bd8cecfa2df6e343b232e816908

  • SSDEEP

    98304:bRJYyhWYSugsS6a5BtGFC6hxyoZMEHGTS6y4wi36gZByUkXWo7FQR:ls8IkrkS6y4ZdZsUkXWYQR

Malware Config

Extracted

Family

hijackloader

Attributes
  • directory

    %APPDATA%\streamCom3

  • inject_dll

    %windir%\SysWOW64\pla.dll

xor.hex

Targets

    • Target

      msi (3).msi

    • Size

      6.2MB

    • MD5

      a65e06ab79f119377a2c92fcecc00dfe

    • SHA1

      4c3fc302743879aa9713540ce33c78ba12b703e4

    • SHA256

      2884419e86608068c59c4352cb7c9472de27549d4710e8ccb2127ac0464e4931

    • SHA512

      98cf6349bff180bd19d227d2cb27d69fe17cf04743fce479a25e7d72c930d7028f90f06ba274207913074fb5251a8bd92a315bd8cecfa2df6e343b232e816908

    • SSDEEP

      98304:bRJYyhWYSugsS6a5BtGFC6hxyoZMEHGTS6y4wi36gZByUkXWo7FQR:ls8IkrkS6y4ZdZsUkXWYQR

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks