General

  • Target

    2b2457c37c5051b7b044da928264ab242b34f37bdebf924a5e563a9f82c3e7bf

  • Size

    425KB

  • Sample

    220615-drlanaadbk

  • MD5

    ea513c4f1a235934efec22e2053deab9

  • SHA1

    e3d202be06fcbae34909092f6a154637d38ca3db

  • SHA256

    2b2457c37c5051b7b044da928264ab242b34f37bdebf924a5e563a9f82c3e7bf

  • SHA512

    3465db0765d508e11c127aa5d3c83040fa4a466bc8f2ad037be72c00e5fe5ec32b16a540c8b69f375cd81ddf4245ae900160e405bb06fa5a798a243595d507cf

Score
10/10

Malware Config

Targets

    • Target

      2b2457c37c5051b7b044da928264ab242b34f37bdebf924a5e563a9f82c3e7bf

    • Size

      425KB

    • MD5

      ea513c4f1a235934efec22e2053deab9

    • SHA1

      e3d202be06fcbae34909092f6a154637d38ca3db

    • SHA256

      2b2457c37c5051b7b044da928264ab242b34f37bdebf924a5e563a9f82c3e7bf

    • SHA512

      3465db0765d508e11c127aa5d3c83040fa4a466bc8f2ad037be72c00e5fe5ec32b16a540c8b69f375cd81ddf4245ae900160e405bb06fa5a798a243595d507cf

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks