General

  • Target

    42aa8ecf0677adfb5dcdbcb7a19485dcbe7a2c2749fc5dda541d2157cdd2be3a

  • Size

    805KB

  • Sample

    220708-b7739aedd4

  • MD5

    8b683771c162d0f751ec0eed59ab8471

  • SHA1

    749e230bfaaab4e79aeab3ba5ca8e6cdc7bde183

  • SHA256

    42aa8ecf0677adfb5dcdbcb7a19485dcbe7a2c2749fc5dda541d2157cdd2be3a

  • SHA512

    bec4cf42857a7a217ec4f4e4cc99905eb9e69a560f6945869fa421b5cfcb7b4b4442385ff3ab758bced5db53f5472d1984a8e23a85cc28e54c8d8cdcfdfe78d2

Malware Config

Targets

    • Target

      42aa8ecf0677adfb5dcdbcb7a19485dcbe7a2c2749fc5dda541d2157cdd2be3a

    • Size

      805KB

    • MD5

      8b683771c162d0f751ec0eed59ab8471

    • SHA1

      749e230bfaaab4e79aeab3ba5ca8e6cdc7bde183

    • SHA256

      42aa8ecf0677adfb5dcdbcb7a19485dcbe7a2c2749fc5dda541d2157cdd2be3a

    • SHA512

      bec4cf42857a7a217ec4f4e4cc99905eb9e69a560f6945869fa421b5cfcb7b4b4442385ff3ab758bced5db53f5472d1984a8e23a85cc28e54c8d8cdcfdfe78d2

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks