General

  • Target

    1b3d46dc69cc41498d46cb57cb5e93e3a03a9a34a34133a0a0321a8feee04bae

  • Size

    757KB

  • Sample

    220607-x219eaebdk

  • MD5

    adde36610fd5b5845bf9f2139acd5087

  • SHA1

    92f19e9fda24c0090d01655c002d1363b5f82db1

  • SHA256

    1b3d46dc69cc41498d46cb57cb5e93e3a03a9a34a34133a0a0321a8feee04bae

  • SHA512

    10a4bb82d0b8cdfb06860e8a20028254ab662bb00f18222e4fa92c396050ca6cc06a7942b2ab81cf041d21eff48665a4b6d949e84d73a3195dfaca9b3cd96bbb

Score
10/10

Malware Config

Targets

    • Target

      1b3d46dc69cc41498d46cb57cb5e93e3a03a9a34a34133a0a0321a8feee04bae

    • Size

      757KB

    • MD5

      adde36610fd5b5845bf9f2139acd5087

    • SHA1

      92f19e9fda24c0090d01655c002d1363b5f82db1

    • SHA256

      1b3d46dc69cc41498d46cb57cb5e93e3a03a9a34a34133a0a0321a8feee04bae

    • SHA512

      10a4bb82d0b8cdfb06860e8a20028254ab662bb00f18222e4fa92c396050ca6cc06a7942b2ab81cf041d21eff48665a4b6d949e84d73a3195dfaca9b3cd96bbb

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks