General

  • Target

    10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f

  • Size

    1.2MB

  • Sample

    220604-ncs23ahbhq

  • MD5

    d9408a9e65a5d2f1bdc1c6d9b6a4affe

  • SHA1

    1c9241b8b202271bcbae2561f03899c49fe52507

  • SHA256

    10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f

  • SHA512

    3341485245170368a8f878b6c614f7f8bf8ceefa2ef8756c6f98db4dcbc4b8c6ba4ef7c7a3082c0ea07a05143dc2cd002a189bc15d0756d2f583aec223319a9b

Malware Config

Targets

    • Target

      10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f

    • Size

      1.2MB

    • MD5

      d9408a9e65a5d2f1bdc1c6d9b6a4affe

    • SHA1

      1c9241b8b202271bcbae2561f03899c49fe52507

    • SHA256

      10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f

    • SHA512

      3341485245170368a8f878b6c614f7f8bf8ceefa2ef8756c6f98db4dcbc4b8c6ba4ef7c7a3082c0ea07a05143dc2cd002a189bc15d0756d2f583aec223319a9b

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks