General

  • Target

    2025-05-17_0ffa4603e12352549cc2480b53002c9f_black-basta

  • Size

    2.0MB

  • Sample

    250517-x6147sem4t

  • MD5

    0ffa4603e12352549cc2480b53002c9f

  • SHA1

    27bfb4904eceb736fe37500278ae0b3a38f6ee38

  • SHA256

    31ab7fa8777c34483510ce25b087d2aa95c5070f673dfb4bb71fdf12125c9cc3

  • SHA512

    9cb2e219c2ea8bae59e3d1f7b72704946ae752fbccf13b11e9f9e09b298fcbfdb522af2d85a5b9e1b3881e659ad615de353aa3931cfa4c37b291afe322fdaabf

  • SSDEEP

    49152:kCv9glfDhXUXmkFYgnv+Y1BxFgJRdo1L/2EXI7j:O+xnvORO1qEX

Score
10/10

Malware Config

Targets

    • Target

      2025-05-17_0ffa4603e12352549cc2480b53002c9f_black-basta

    • Size

      2.0MB

    • MD5

      0ffa4603e12352549cc2480b53002c9f

    • SHA1

      27bfb4904eceb736fe37500278ae0b3a38f6ee38

    • SHA256

      31ab7fa8777c34483510ce25b087d2aa95c5070f673dfb4bb71fdf12125c9cc3

    • SHA512

      9cb2e219c2ea8bae59e3d1f7b72704946ae752fbccf13b11e9f9e09b298fcbfdb522af2d85a5b9e1b3881e659ad615de353aa3931cfa4c37b291afe322fdaabf

    • SSDEEP

      49152:kCv9glfDhXUXmkFYgnv+Y1BxFgJRdo1L/2EXI7j:O+xnvORO1qEX

    Score
    10/10
    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks

OSZAR »