General

  • Target

    3c3557d4bcad650d784053c1b8cb81e94045a5c9bfca6c2c4af2546b353589e0

  • Size

    651KB

  • Sample

    220703-j5vn5sdgh5

  • MD5

    3a4603408b7f9cf81b35e35098333d47

  • SHA1

    f78f6215dea5ecb2168b9b122e976e4a936a6ea0

  • SHA256

    3c3557d4bcad650d784053c1b8cb81e94045a5c9bfca6c2c4af2546b353589e0

  • SHA512

    5ba5bd6ace28cbdd8bb56c3f6b8490110ef903f8aae39583bb36195095796d429e6ed238971a6ad9fc8b25ee2a9f563ddb0a4c902f4ede5f4ecd1d626c0c17e9

Malware Config

Targets

    • Target

      3c3557d4bcad650d784053c1b8cb81e94045a5c9bfca6c2c4af2546b353589e0

    • Size

      651KB

    • MD5

      3a4603408b7f9cf81b35e35098333d47

    • SHA1

      f78f6215dea5ecb2168b9b122e976e4a936a6ea0

    • SHA256

      3c3557d4bcad650d784053c1b8cb81e94045a5c9bfca6c2c4af2546b353589e0

    • SHA512

      5ba5bd6ace28cbdd8bb56c3f6b8490110ef903f8aae39583bb36195095796d429e6ed238971a6ad9fc8b25ee2a9f563ddb0a4c902f4ede5f4ecd1d626c0c17e9

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks