General

  • Target

    3cb190d7d394d50036afa3cc8ab5149c4003fdcb5af0dd391b2b5cbd8d02a099

  • Size

    3.8MB

  • Sample

    220703-gbt5eahabp

  • MD5

    a281bd275a6524d36bcb40a626772bb3

  • SHA1

    a62dfb8e1151d2b6d084d832f4c9ee600be5eef5

  • SHA256

    3cb190d7d394d50036afa3cc8ab5149c4003fdcb5af0dd391b2b5cbd8d02a099

  • SHA512

    96cf58d31a6f5372146019f9413bf1ee9412e3068b72e968c918c8f3402bbd3de967b8ad6456f2acced1fe7a1e242844814191826d90fbc4e757d60dce03882a

Score
10/10

Malware Config

Targets

    • Target

      3cb190d7d394d50036afa3cc8ab5149c4003fdcb5af0dd391b2b5cbd8d02a099

    • Size

      3.8MB

    • MD5

      a281bd275a6524d36bcb40a626772bb3

    • SHA1

      a62dfb8e1151d2b6d084d832f4c9ee600be5eef5

    • SHA256

      3cb190d7d394d50036afa3cc8ab5149c4003fdcb5af0dd391b2b5cbd8d02a099

    • SHA512

      96cf58d31a6f5372146019f9413bf1ee9412e3068b72e968c918c8f3402bbd3de967b8ad6456f2acced1fe7a1e242844814191826d90fbc4e757d60dce03882a

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks