General

  • Target

    f702ce107528b41bd2d6f725779f898d63a2dd1139cd5ae6da85d2eb6b51ca8e.exe

  • Size

    768KB

  • Sample

    240617-ydrwhawajm

  • MD5

    1e78e781179b203275f674f4015f1512

  • SHA1

    3c6e2e00953cf99248967d70613e8e5ec9570723

  • SHA256

    f702ce107528b41bd2d6f725779f898d63a2dd1139cd5ae6da85d2eb6b51ca8e

  • SHA512

    4a952563f506089d2fc5aa8b785956fab692604d02214ac8cb9457499c5e9795088f6f3d9ba18d2dcc5019d2e4e8c84285f6cef3ab5e1dd30de06d2f9e01ea75

  • SSDEEP

    12288:tvsXZv8km0OHcbGbvzWHz0HnquwTy+g0ssFWylkkoAbtEjQwfNqbYS2VbICKMIUb:+fPz0HILg0ssFlSj4nm

Malware Config

Targets

    • Target

      f702ce107528b41bd2d6f725779f898d63a2dd1139cd5ae6da85d2eb6b51ca8e.exe

    • Size

      768KB

    • MD5

      1e78e781179b203275f674f4015f1512

    • SHA1

      3c6e2e00953cf99248967d70613e8e5ec9570723

    • SHA256

      f702ce107528b41bd2d6f725779f898d63a2dd1139cd5ae6da85d2eb6b51ca8e

    • SHA512

      4a952563f506089d2fc5aa8b785956fab692604d02214ac8cb9457499c5e9795088f6f3d9ba18d2dcc5019d2e4e8c84285f6cef3ab5e1dd30de06d2f9e01ea75

    • SSDEEP

      12288:tvsXZv8km0OHcbGbvzWHz0HnquwTy+g0ssFWylkkoAbtEjQwfNqbYS2VbICKMIUb:+fPz0HILg0ssFlSj4nm

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks