General

  • Target

    1a577736a0bb184745434ef6bf32af83b12eaf51e9d15d346841909afa242e21

  • Size

    835KB

  • Sample

    220608-d456lafddl

  • MD5

    0afb3a897b5b73b79c49fec0ffa5d768

  • SHA1

    51a256b8113d5652ce04f255386168f3e892ad8c

  • SHA256

    1a577736a0bb184745434ef6bf32af83b12eaf51e9d15d346841909afa242e21

  • SHA512

    8716c14a10bbb9181e879ad3d82324edad98c7374a0e57ef665a3dbcd6d4e6014d69c7d9cce8de159b91e1aeb62fb65bf77a8e4f0cf92571a069d6be6d4da6ae

Score
10/10

Malware Config

Targets

    • Target

      1a577736a0bb184745434ef6bf32af83b12eaf51e9d15d346841909afa242e21

    • Size

      835KB

    • MD5

      0afb3a897b5b73b79c49fec0ffa5d768

    • SHA1

      51a256b8113d5652ce04f255386168f3e892ad8c

    • SHA256

      1a577736a0bb184745434ef6bf32af83b12eaf51e9d15d346841909afa242e21

    • SHA512

      8716c14a10bbb9181e879ad3d82324edad98c7374a0e57ef665a3dbcd6d4e6014d69c7d9cce8de159b91e1aeb62fb65bf77a8e4f0cf92571a069d6be6d4da6ae

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks