General

  • Target

    290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743

  • Size

    431KB

  • Sample

    220615-s4dhxadefq

  • MD5

    874070b71835ed9318ddd22f7bf19401

  • SHA1

    0f3da757863c2856806f8b2fc2528c6cba991158

  • SHA256

    290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743

  • SHA512

    b596ec5be90ff0d22f04114831c9f6263df86d25a616c0f5e7449690b387f9207a8f0f0533bee39888fff3ac7c50a5dde31bd393c47f91f9355db3cd9e0118d5

Malware Config

Targets

    • Target

      290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743

    • Size

      431KB

    • MD5

      874070b71835ed9318ddd22f7bf19401

    • SHA1

      0f3da757863c2856806f8b2fc2528c6cba991158

    • SHA256

      290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743

    • SHA512

      b596ec5be90ff0d22f04114831c9f6263df86d25a616c0f5e7449690b387f9207a8f0f0533bee39888fff3ac7c50a5dde31bd393c47f91f9355db3cd9e0118d5

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops desktop.ini file(s)

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks