General

  • Target

    pdScript.exe

  • Size

    3.2MB

  • Sample

    240622-1mzc2szcjr

  • MD5

    d464091627b9892b52f3f62fa3a03264

  • SHA1

    85617122af6e94afada156fbe577bc59ca9dca8f

  • SHA256

    de2b6a281000101e51a1848ea5ae9526355d749ca8095b25ce0b43b8641d4a63

  • SHA512

    290bbe3de0051f9c29049fedf259cf3cb4d1b3015c468e7d5e93cbee11534f1f920b18b49363864d3f367590ec7342ba800cd988ac98db081271c3b76726e21c

  • SSDEEP

    49152:NI9+2qYtQ/Rg2ECNUg2I7wUpEroPeeegawQTCIyVM8OoJNY:Sg21t0q2ECNURoPblawXIyXOoc

Score
10/10

Malware Config

Targets

    • Target

      pdScript.exe

    • Size

      3.2MB

    • MD5

      d464091627b9892b52f3f62fa3a03264

    • SHA1

      85617122af6e94afada156fbe577bc59ca9dca8f

    • SHA256

      de2b6a281000101e51a1848ea5ae9526355d749ca8095b25ce0b43b8641d4a63

    • SHA512

      290bbe3de0051f9c29049fedf259cf3cb4d1b3015c468e7d5e93cbee11534f1f920b18b49363864d3f367590ec7342ba800cd988ac98db081271c3b76726e21c

    • SSDEEP

      49152:NI9+2qYtQ/Rg2ECNUg2I7wUpEroPeeegawQTCIyVM8OoJNY:Sg21t0q2ECNURoPblawXIyXOoc

    Score
    10/10
    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks