General

  • Target

    0715e1cfab9d4e4f13610d788bac2cad2d412881a3917560ef61e0cc8cdcffa2

  • Size

    718KB

  • Sample

    220531-dzfp5sgfak

  • MD5

    d9b17b3e7884802a2dc2c46432b8ba99

  • SHA1

    08e3bfb6fa24a6a1aebd579bb2307156478bfd8e

  • SHA256

    0715e1cfab9d4e4f13610d788bac2cad2d412881a3917560ef61e0cc8cdcffa2

  • SHA512

    d9c6f3338619350aa34343d570b62962f096770a1a402e9d01b04d1c3bd6438bee917ec3875917eb59ba81d4ef09c943cc1640f7cbaaf7cf52f7270bca42b7a1

Score
10/10

Malware Config

Targets

    • Target

      0715e1cfab9d4e4f13610d788bac2cad2d412881a3917560ef61e0cc8cdcffa2

    • Size

      718KB

    • MD5

      d9b17b3e7884802a2dc2c46432b8ba99

    • SHA1

      08e3bfb6fa24a6a1aebd579bb2307156478bfd8e

    • SHA256

      0715e1cfab9d4e4f13610d788bac2cad2d412881a3917560ef61e0cc8cdcffa2

    • SHA512

      d9c6f3338619350aa34343d570b62962f096770a1a402e9d01b04d1c3bd6438bee917ec3875917eb59ba81d4ef09c943cc1640f7cbaaf7cf52f7270bca42b7a1

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks