General

  • Target

    06d69058adecff07609b0916b28f042629724ee10739b08d4b3631066a613e76

  • Size

    426KB

  • Sample

    220531-ez6r1aaaam

  • MD5

    58b82f6046af7142174639c87cc98049

  • SHA1

    ccc10bb1450f97141f5da53c06a331ceb9afeb46

  • SHA256

    06d69058adecff07609b0916b28f042629724ee10739b08d4b3631066a613e76

  • SHA512

    20c1242c8ffa359d2d98bac66581e7b346315d377d8e2a64a42f85837a51b36172c0a05e4af81a5844ebdab044d919969046aefb011f2d7e06b3f95bce64c992

Malware Config

Targets

    • Target

      06d69058adecff07609b0916b28f042629724ee10739b08d4b3631066a613e76

    • Size

      426KB

    • MD5

      58b82f6046af7142174639c87cc98049

    • SHA1

      ccc10bb1450f97141f5da53c06a331ceb9afeb46

    • SHA256

      06d69058adecff07609b0916b28f042629724ee10739b08d4b3631066a613e76

    • SHA512

      20c1242c8ffa359d2d98bac66581e7b346315d377d8e2a64a42f85837a51b36172c0a05e4af81a5844ebdab044d919969046aefb011f2d7e06b3f95bce64c992

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops desktop.ini file(s)

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks