General

  • Target

    30ec5198eb3e9f6736a94237737b59f710041b1d37d3dd1e0cdeabaa110536d2

  • Size

    624KB

  • Sample

    220621-bvxfzsabh3

  • MD5

    26addb13f9096b2571b9b33c7fab01f3

  • SHA1

    6b5586ff7d6918a26b8df8e69b1b53a6cbde1234

  • SHA256

    30ec5198eb3e9f6736a94237737b59f710041b1d37d3dd1e0cdeabaa110536d2

  • SHA512

    294fc6c142d8b587bbd712e26c5b903ffab00f18900908489668a6ebdd752dcf11e2166dc5ed7b400d7b7a5aa0ac2e3ca58333daa0fd28763e4aab78aabeaa6c

Score
10/10

Malware Config

Targets

    • Target

      30ec5198eb3e9f6736a94237737b59f710041b1d37d3dd1e0cdeabaa110536d2

    • Size

      624KB

    • MD5

      26addb13f9096b2571b9b33c7fab01f3

    • SHA1

      6b5586ff7d6918a26b8df8e69b1b53a6cbde1234

    • SHA256

      30ec5198eb3e9f6736a94237737b59f710041b1d37d3dd1e0cdeabaa110536d2

    • SHA512

      294fc6c142d8b587bbd712e26c5b903ffab00f18900908489668a6ebdd752dcf11e2166dc5ed7b400d7b7a5aa0ac2e3ca58333daa0fd28763e4aab78aabeaa6c

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks