General

  • Target

    2dc8b0eba2bbe22278b3c75aa52a3a1ae29453ffd2ae76db70950cb8ddf1a65d

  • Size

    624KB

  • Sample

    220622-qz6msafhfr

  • MD5

    a291cfb18fad41a1e05b2c8c1ad84a49

  • SHA1

    ac59f167d4521ac434035c10f1f0a76631e09e24

  • SHA256

    2dc8b0eba2bbe22278b3c75aa52a3a1ae29453ffd2ae76db70950cb8ddf1a65d

  • SHA512

    b07dfa37de1bdb813e07df3e6485242a24f6a3b0066104980415ffe46400ab495636aa048aa01da08568d164293cd5b54213bec5180bda5c370fb9060db21e60

Score
10/10

Malware Config

Targets

    • Target

      2dc8b0eba2bbe22278b3c75aa52a3a1ae29453ffd2ae76db70950cb8ddf1a65d

    • Size

      624KB

    • MD5

      a291cfb18fad41a1e05b2c8c1ad84a49

    • SHA1

      ac59f167d4521ac434035c10f1f0a76631e09e24

    • SHA256

      2dc8b0eba2bbe22278b3c75aa52a3a1ae29453ffd2ae76db70950cb8ddf1a65d

    • SHA512

      b07dfa37de1bdb813e07df3e6485242a24f6a3b0066104980415ffe46400ab495636aa048aa01da08568d164293cd5b54213bec5180bda5c370fb9060db21e60

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks