General

  • Target

    fa2e481df7d1faab51d2d38ee312c6578f61a55417433582a586361d723286ee

  • Size

    445KB

  • Sample

    220609-qjdl3agdfp

  • MD5

    aaf04ac5d630081210a8199680dd2d4f

  • SHA1

    aff69b1b8b1c3ea4e26c3009e4b0933430255e3c

  • SHA256

    fa2e481df7d1faab51d2d38ee312c6578f61a55417433582a586361d723286ee

  • SHA512

    48ffe4b6088532c30300ab2bcba211ddedaab580b7af2e4d91df23f3596e96f58bb2179749926dd42d9990c200003af270c3e3a9ec52524bab9b9821506e6cf8

Malware Config

Targets

    • Target

      fa2e481df7d1faab51d2d38ee312c6578f61a55417433582a586361d723286ee

    • Size

      445KB

    • MD5

      aaf04ac5d630081210a8199680dd2d4f

    • SHA1

      aff69b1b8b1c3ea4e26c3009e4b0933430255e3c

    • SHA256

      fa2e481df7d1faab51d2d38ee312c6578f61a55417433582a586361d723286ee

    • SHA512

      48ffe4b6088532c30300ab2bcba211ddedaab580b7af2e4d91df23f3596e96f58bb2179749926dd42d9990c200003af270c3e3a9ec52524bab9b9821506e6cf8

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks