General

  • Target

    644f92c3109e62bd989145af1f0879ef3b3fccc28f98d443a71bf8c52d46709c

  • Size

    1.0MB

  • Sample

    220625-njajascea7

  • MD5

    bf41f994a287a74be5fa1b9bbef61e25

  • SHA1

    6dad025caf3ab68aeba93b079356eeb9edc36d16

  • SHA256

    644f92c3109e62bd989145af1f0879ef3b3fccc28f98d443a71bf8c52d46709c

  • SHA512

    ccc28c30cb0cc380aecf6067b66312e423341dd46112652b69137dd333f4683dfa779c2509e97f7c39a61f5e7ee647ff04016407e5a98a3738b5cf2c6d946294

Score
10/10

Malware Config

Targets

    • Target

      644f92c3109e62bd989145af1f0879ef3b3fccc28f98d443a71bf8c52d46709c

    • Size

      1.0MB

    • MD5

      bf41f994a287a74be5fa1b9bbef61e25

    • SHA1

      6dad025caf3ab68aeba93b079356eeb9edc36d16

    • SHA256

      644f92c3109e62bd989145af1f0879ef3b3fccc28f98d443a71bf8c52d46709c

    • SHA512

      ccc28c30cb0cc380aecf6067b66312e423341dd46112652b69137dd333f4683dfa779c2509e97f7c39a61f5e7ee647ff04016407e5a98a3738b5cf2c6d946294

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks