General

  • Target

    1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9

  • Size

    808KB

  • Sample

    220612-w2xqjsfbe8

  • MD5

    295336d2300f36222053ac4e75883764

  • SHA1

    d1a8b339d466b0b827cf607fd8fdeb7ed1b85295

  • SHA256

    1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9

  • SHA512

    eceb31db79c3c8cec7aef2492f9dcc24ec9a0b6711dea807ac3e30671b26ef2266e8b9e2ffb47c1a4977fb764328ab7571d51e5e218471bb63e1ab337e8a8cdd

Malware Config

Targets

    • Target

      1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9

    • Size

      808KB

    • MD5

      295336d2300f36222053ac4e75883764

    • SHA1

      d1a8b339d466b0b827cf607fd8fdeb7ed1b85295

    • SHA256

      1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9

    • SHA512

      eceb31db79c3c8cec7aef2492f9dcc24ec9a0b6711dea807ac3e30671b26ef2266e8b9e2ffb47c1a4977fb764328ab7571d51e5e218471bb63e1ab337e8a8cdd

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks