General

  • Target

    5942c53271713129e5c59599285a1076175d600b5243abc6740f684f913aecb4

  • Size

    529KB

  • Sample

    220609-qjz53agdgm

  • MD5

    d0cd207ae63850be7d0f5f9bea798fda

  • SHA1

    98498d60291e9da6d7493e144f499c9ea13833ce

  • SHA256

    5942c53271713129e5c59599285a1076175d600b5243abc6740f684f913aecb4

  • SHA512

    dd9dc25bc73de0f2042774b5de5e99c2b612c4e5fa3d84060925457e0a0d1e4b090def9cb8922898b3ee06f95d40b87c2def49fd4d979e38a173eb860319b9f2

Malware Config

Targets

    • Target

      5942c53271713129e5c59599285a1076175d600b5243abc6740f684f913aecb4

    • Size

      529KB

    • MD5

      d0cd207ae63850be7d0f5f9bea798fda

    • SHA1

      98498d60291e9da6d7493e144f499c9ea13833ce

    • SHA256

      5942c53271713129e5c59599285a1076175d600b5243abc6740f684f913aecb4

    • SHA512

      dd9dc25bc73de0f2042774b5de5e99c2b612c4e5fa3d84060925457e0a0d1e4b090def9cb8922898b3ee06f95d40b87c2def49fd4d979e38a173eb860319b9f2

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks