General

  • Target

    082da28aa4e04257530e7deec15a493add1790a57194039630e5ab37bff755d1

  • Size

    1.7MB

  • Sample

    220530-25yd5sebf7

  • MD5

    f0296cf398efd8af5823f56af8825e2f

  • SHA1

    1ef0fe0d107b86a7b6a88ce7f9b12aa1e623a754

  • SHA256

    082da28aa4e04257530e7deec15a493add1790a57194039630e5ab37bff755d1

  • SHA512

    f0950670ed2fe9e92211c69d7e758beca2a5622024f75ab550c5d90bc9401176cf1ae76e4a3b964a16c257f0884b960b5dc36188bc549324a6178d0b69e503f7

Score
10/10

Malware Config

Targets

    • Target

      082da28aa4e04257530e7deec15a493add1790a57194039630e5ab37bff755d1

    • Size

      1.7MB

    • MD5

      f0296cf398efd8af5823f56af8825e2f

    • SHA1

      1ef0fe0d107b86a7b6a88ce7f9b12aa1e623a754

    • SHA256

      082da28aa4e04257530e7deec15a493add1790a57194039630e5ab37bff755d1

    • SHA512

      f0950670ed2fe9e92211c69d7e758beca2a5622024f75ab550c5d90bc9401176cf1ae76e4a3b964a16c257f0884b960b5dc36188bc549324a6178d0b69e503f7

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks