General

  • Target

    137eec246861c67da104f8fac0d66b21e035b04337e96aa145aebe6957a4a16d

  • Size

    538KB

  • Sample

    220603-gqvz9aagd2

  • MD5

    b6779f1e776b3e8352cf0d8fabc454db

  • SHA1

    80d8a0a1a5b79105a936cb5326c30fba9bb2e6e2

  • SHA256

    137eec246861c67da104f8fac0d66b21e035b04337e96aa145aebe6957a4a16d

  • SHA512

    f3b0369d1237444834a34beeb532065ab1f7c0d623cb50cb4edbe6d307343b31ddf79156c804d0474ff6a6f2a9c28717a46b478c1d03b69e2a9b8f13fd1d2773

Score
10/10

Malware Config

Targets

    • Target

      137eec246861c67da104f8fac0d66b21e035b04337e96aa145aebe6957a4a16d

    • Size

      538KB

    • MD5

      b6779f1e776b3e8352cf0d8fabc454db

    • SHA1

      80d8a0a1a5b79105a936cb5326c30fba9bb2e6e2

    • SHA256

      137eec246861c67da104f8fac0d66b21e035b04337e96aa145aebe6957a4a16d

    • SHA512

      f3b0369d1237444834a34beeb532065ab1f7c0d623cb50cb4edbe6d307343b31ddf79156c804d0474ff6a6f2a9c28717a46b478c1d03b69e2a9b8f13fd1d2773

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks