General

  • Target

    690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e

  • Size

    699KB

  • Sample

    220609-qgm3qacgb4

  • MD5

    519ece9d56d4475f0b1287c0d22ebfc2

  • SHA1

    58c99f6ef9f87f2f3cb2f807abf4db2dcfaf2d27

  • SHA256

    690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e

  • SHA512

    067ba9b3646f3098a9cc923c004bac20bf551902309858a1160409938cdf27d84e29dc27cda8bf0556988dcc6c950ba532ec6e34471f5908574ab4740d206399

Malware Config

Targets

    • Target

      690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e

    • Size

      699KB

    • MD5

      519ece9d56d4475f0b1287c0d22ebfc2

    • SHA1

      58c99f6ef9f87f2f3cb2f807abf4db2dcfaf2d27

    • SHA256

      690801eec09647f2b90684695d350bd2f7c18bac46ff9e04a62df1fa857aa06e

    • SHA512

      067ba9b3646f3098a9cc923c004bac20bf551902309858a1160409938cdf27d84e29dc27cda8bf0556988dcc6c950ba532ec6e34471f5908574ab4740d206399

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks