General

  • Target

    2bb661414e83dc066f346fa9a3dbb1666ca7a7e200c9e80c8e3c2d15041bcc25

  • Size

    1.0MB

  • Sample

    220615-blhapsaca5

  • MD5

    00d96b2925e451cfa8472648860c82f3

  • SHA1

    1523eda532178724b3ae122b18b2038020df8cf7

  • SHA256

    2bb661414e83dc066f346fa9a3dbb1666ca7a7e200c9e80c8e3c2d15041bcc25

  • SHA512

    a22a2b41f23dd4b2862496e6bac67cf9e86ea3c44bf66bc224a172bb9f39356fc7b119c77d7d2168d1aa06df53dbc5ab40a6d891dabcfbcaa246826023a08fdc

Score
10/10

Malware Config

Targets

    • Target

      2bb661414e83dc066f346fa9a3dbb1666ca7a7e200c9e80c8e3c2d15041bcc25

    • Size

      1.0MB

    • MD5

      00d96b2925e451cfa8472648860c82f3

    • SHA1

      1523eda532178724b3ae122b18b2038020df8cf7

    • SHA256

      2bb661414e83dc066f346fa9a3dbb1666ca7a7e200c9e80c8e3c2d15041bcc25

    • SHA512

      a22a2b41f23dd4b2862496e6bac67cf9e86ea3c44bf66bc224a172bb9f39356fc7b119c77d7d2168d1aa06df53dbc5ab40a6d891dabcfbcaa246826023a08fdc

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks