General

  • Target

    27d674ed208ec0ab0a64df20a98b76d85cab116e788e59eb6dad97279b6eff08

  • Size

    336KB

  • Sample

    220616-dn32ashccp

  • MD5

    084d86609587defbde124a4fd9c49d50

  • SHA1

    5ddc40700124f0cd860eaa67dd54124ca4dfd99a

  • SHA256

    27d674ed208ec0ab0a64df20a98b76d85cab116e788e59eb6dad97279b6eff08

  • SHA512

    45b40a29904d8bccfbbab3eda38dfad4f4691f62cb974cfb32d6f1517e3a927d4be3b808ee26bbb39749b874c8ed71bbb49d93d55ee7ba7ec62654fe3c12a8e8

Malware Config

Targets

    • Target

      27d674ed208ec0ab0a64df20a98b76d85cab116e788e59eb6dad97279b6eff08

    • Size

      336KB

    • MD5

      084d86609587defbde124a4fd9c49d50

    • SHA1

      5ddc40700124f0cd860eaa67dd54124ca4dfd99a

    • SHA256

      27d674ed208ec0ab0a64df20a98b76d85cab116e788e59eb6dad97279b6eff08

    • SHA512

      45b40a29904d8bccfbbab3eda38dfad4f4691f62cb974cfb32d6f1517e3a927d4be3b808ee26bbb39749b874c8ed71bbb49d93d55ee7ba7ec62654fe3c12a8e8

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks