General

  • Target

    34fac25089c3b96f743705ffdd7ed3ef5213915c4fdaefa8a0cb5c984a3525c4

  • Size

    854KB

  • Sample

    220619-x2bczsccb5

  • MD5

    f5081dc1115e74ceee116f089cfe8b96

  • SHA1

    36085d6cf0ef3cc3f24f8efe4ee7286f28a0d28c

  • SHA256

    34fac25089c3b96f743705ffdd7ed3ef5213915c4fdaefa8a0cb5c984a3525c4

  • SHA512

    776c0a4c34ef55a316309547fcfdd93910f381ae7be3bdddb82247f3255f2430fd07faf143bdb02e1db8f7112b7bcd265c6a2f5fd4abd8bced46e3171527adb0

Score
10/10

Malware Config

Targets

    • Target

      34fac25089c3b96f743705ffdd7ed3ef5213915c4fdaefa8a0cb5c984a3525c4

    • Size

      854KB

    • MD5

      f5081dc1115e74ceee116f089cfe8b96

    • SHA1

      36085d6cf0ef3cc3f24f8efe4ee7286f28a0d28c

    • SHA256

      34fac25089c3b96f743705ffdd7ed3ef5213915c4fdaefa8a0cb5c984a3525c4

    • SHA512

      776c0a4c34ef55a316309547fcfdd93910f381ae7be3bdddb82247f3255f2430fd07faf143bdb02e1db8f7112b7bcd265c6a2f5fd4abd8bced46e3171527adb0

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks