General

  • Target

    5935b8bd4207083126b8f404b375945cfe3c0b61650014101de4eefa8cd80ee4

  • Size

    530KB

  • Sample

    220609-qjzvascgh3

  • MD5

    42f6f0345d197c20aa749db1b65ee55e

  • SHA1

    51170fd0b70e698063804214350e71fd5abf4b9c

  • SHA256

    5935b8bd4207083126b8f404b375945cfe3c0b61650014101de4eefa8cd80ee4

  • SHA512

    35cff10983b89b699a0685f00899bc8f6922691936d9cf3d3f0bd42b9d9cff7854e63adca92b761810021230f4af23e2431e090e02a65bc3d404284ddb1c372e

Malware Config

Targets

    • Target

      5935b8bd4207083126b8f404b375945cfe3c0b61650014101de4eefa8cd80ee4

    • Size

      530KB

    • MD5

      42f6f0345d197c20aa749db1b65ee55e

    • SHA1

      51170fd0b70e698063804214350e71fd5abf4b9c

    • SHA256

      5935b8bd4207083126b8f404b375945cfe3c0b61650014101de4eefa8cd80ee4

    • SHA512

      35cff10983b89b699a0685f00899bc8f6922691936d9cf3d3f0bd42b9d9cff7854e63adca92b761810021230f4af23e2431e090e02a65bc3d404284ddb1c372e

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks