General

  • Target

    41da47a170f485b14f61b095ea488d54f33a11de60afaa845c4f146c06704dd5

  • Size

    1.3MB

  • Sample

    220708-e1vfcsbdd4

  • MD5

    46f3cb1f7ebc3a9713e726d9506afa5f

  • SHA1

    e60ebfa3d159df9f6fd1e0bc7842bf6204477d00

  • SHA256

    41da47a170f485b14f61b095ea488d54f33a11de60afaa845c4f146c06704dd5

  • SHA512

    2cc74852fc1a58a360d7f8dbce7e369fe6924e4738234eec4c1b81b8ca494234c1fb7afa32f9825cddda04d8757da1ac02fc4b32325528bca858e266873495f8

Score
10/10

Malware Config

Targets

    • Target

      41da47a170f485b14f61b095ea488d54f33a11de60afaa845c4f146c06704dd5

    • Size

      1.3MB

    • MD5

      46f3cb1f7ebc3a9713e726d9506afa5f

    • SHA1

      e60ebfa3d159df9f6fd1e0bc7842bf6204477d00

    • SHA256

      41da47a170f485b14f61b095ea488d54f33a11de60afaa845c4f146c06704dd5

    • SHA512

      2cc74852fc1a58a360d7f8dbce7e369fe6924e4738234eec4c1b81b8ca494234c1fb7afa32f9825cddda04d8757da1ac02fc4b32325528bca858e266873495f8

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks