General

  • Target

    2a65ffc042cc9b54f0d4d9eeab9994cd4ec1a7d13bb6ca40e807fa6307b65c22

  • Size

    770KB

  • Sample

    220609-qg8dnagdcr

  • MD5

    0915566735968b4ea5f5dadbf7d585cc

  • SHA1

    3654d150d8530d1436acfc028810aef440373a2d

  • SHA256

    2a65ffc042cc9b54f0d4d9eeab9994cd4ec1a7d13bb6ca40e807fa6307b65c22

  • SHA512

    13edab8e5debe345b0930db5bc5ec36a9b904051634721eb3893ee0d771cc45a470f9b630d40bf1ba2780e3da7ba00370e158c027bdf505c08bd3f12a9ee06ac

Malware Config

Targets

    • Target

      2a65ffc042cc9b54f0d4d9eeab9994cd4ec1a7d13bb6ca40e807fa6307b65c22

    • Size

      770KB

    • MD5

      0915566735968b4ea5f5dadbf7d585cc

    • SHA1

      3654d150d8530d1436acfc028810aef440373a2d

    • SHA256

      2a65ffc042cc9b54f0d4d9eeab9994cd4ec1a7d13bb6ca40e807fa6307b65c22

    • SHA512

      13edab8e5debe345b0930db5bc5ec36a9b904051634721eb3893ee0d771cc45a470f9b630d40bf1ba2780e3da7ba00370e158c027bdf505c08bd3f12a9ee06ac

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks