General

  • Target

    LatencyMon.exe

  • Size

    3.8MB

  • Sample

    240623-bavfwswhqr

  • MD5

    b5934aadb33c3458d522c40be73b2c05

  • SHA1

    f484499f7ee91897a7e51743c17c173c409333a4

  • SHA256

    84e1dc5203b40434e0bfa3320ce622bc3e14d3846a5447a1533ed6fabfffb6f6

  • SHA512

    a91251797be880e95b953909a9d687a54b99eb624a4c3091ca3e1bd6a03948fe7cb8f0a8f72a525cca28c579a8ec1a2c9a8076ad8c403a9da770ab2f8a4bc41b

  • SSDEEP

    98304:sVOXR0YaZN+KbaUYLr3p9AN41tBOKUTBXGx/eAG:kc0YaLXOr3fAu1tLUha/NG

Score
10/10

Malware Config

Targets

    • Target

      LatencyMon.exe

    • Size

      3.8MB

    • MD5

      b5934aadb33c3458d522c40be73b2c05

    • SHA1

      f484499f7ee91897a7e51743c17c173c409333a4

    • SHA256

      84e1dc5203b40434e0bfa3320ce622bc3e14d3846a5447a1533ed6fabfffb6f6

    • SHA512

      a91251797be880e95b953909a9d687a54b99eb624a4c3091ca3e1bd6a03948fe7cb8f0a8f72a525cca28c579a8ec1a2c9a8076ad8c403a9da770ab2f8a4bc41b

    • SSDEEP

      98304:sVOXR0YaZN+KbaUYLr3p9AN41tBOKUTBXGx/eAG:kc0YaLXOr3fAu1tLUha/NG

    Score
    10/10
    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Tasks