General

  • Target

    1e640fce2c561f756b28af7a3e11c2622ac20b03660df83ffd5d14a437112bae

  • Size

    1.1MB

  • Sample

    220612-z4t9zsfhgj

  • MD5

    c8e7010fa9b25b9c4b8a2dec9627c2ff

  • SHA1

    86108e00d38d5b4b2b01ec1370dc66893f79c9e1

  • SHA256

    1e640fce2c561f756b28af7a3e11c2622ac20b03660df83ffd5d14a437112bae

  • SHA512

    14c99aacb27a31f103c4c7831e55a371ec502bc901476369fb50568f61fe37cc80717e0736d7a0d6ea7040462808df2727705e541e5a2cd7007b75daafdd96d7

Score
10/10

Malware Config

Targets

    • Target

      1e640fce2c561f756b28af7a3e11c2622ac20b03660df83ffd5d14a437112bae

    • Size

      1.1MB

    • MD5

      c8e7010fa9b25b9c4b8a2dec9627c2ff

    • SHA1

      86108e00d38d5b4b2b01ec1370dc66893f79c9e1

    • SHA256

      1e640fce2c561f756b28af7a3e11c2622ac20b03660df83ffd5d14a437112bae

    • SHA512

      14c99aacb27a31f103c4c7831e55a371ec502bc901476369fb50568f61fe37cc80717e0736d7a0d6ea7040462808df2727705e541e5a2cd7007b75daafdd96d7

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks