General

  • Target

    08d3f3c6b3d378916807cc663b5313603091f604340eb9239e2cd40ef214d6e6

  • Size

    609KB

  • Sample

    220530-zjlr4saeb2

  • MD5

    9f4badff4cac6ad653c83db9af6e68f6

  • SHA1

    368e63412272af6f54c6779974f3052f715684f7

  • SHA256

    08d3f3c6b3d378916807cc663b5313603091f604340eb9239e2cd40ef214d6e6

  • SHA512

    e5ede1d6c713f0269bd611109468cb7e26715708ff033f3c32d0bf6d888822e6993a968a6b8fe7a5cc62d7b88ad293e71efbdcf50086974cd676f2eb69926a59

Score
10/10

Malware Config

Targets

    • Target

      08d3f3c6b3d378916807cc663b5313603091f604340eb9239e2cd40ef214d6e6

    • Size

      609KB

    • MD5

      9f4badff4cac6ad653c83db9af6e68f6

    • SHA1

      368e63412272af6f54c6779974f3052f715684f7

    • SHA256

      08d3f3c6b3d378916807cc663b5313603091f604340eb9239e2cd40ef214d6e6

    • SHA512

      e5ede1d6c713f0269bd611109468cb7e26715708ff033f3c32d0bf6d888822e6993a968a6b8fe7a5cc62d7b88ad293e71efbdcf50086974cd676f2eb69926a59

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks