General

  • Target

    2522de66809256ee6b0b2662561ebb99c28da2866518cf07f3f1074438d243a1

  • Size

    1.2MB

  • Sample

    220611-ysl9kaagb5

  • MD5

    eb125a1ea2711eb97c56351201daac4e

  • SHA1

    43b99ea1bf5cdff58b1e7386f915bcb8813b679b

  • SHA256

    2522de66809256ee6b0b2662561ebb99c28da2866518cf07f3f1074438d243a1

  • SHA512

    c35f23a4cd836dfad77d0ff58cd7c4c0f34eb1857daf4f1542e7257a8ca06ea6d610c72948c1a24e225d25bb8cc762e127a75a35bae30b5fabddcd393d4ac4ad

Score
10/10

Malware Config

Targets

    • Target

      2522de66809256ee6b0b2662561ebb99c28da2866518cf07f3f1074438d243a1

    • Size

      1.2MB

    • MD5

      eb125a1ea2711eb97c56351201daac4e

    • SHA1

      43b99ea1bf5cdff58b1e7386f915bcb8813b679b

    • SHA256

      2522de66809256ee6b0b2662561ebb99c28da2866518cf07f3f1074438d243a1

    • SHA512

      c35f23a4cd836dfad77d0ff58cd7c4c0f34eb1857daf4f1542e7257a8ca06ea6d610c72948c1a24e225d25bb8cc762e127a75a35bae30b5fabddcd393d4ac4ad

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks