General

  • Target

    40f4abd6538f6bb6bea75ce34dfd087614bc33bf33e1bc6fd31fe8a2bba4f960

  • Size

    396KB

  • Sample

    220708-jxfj9agdgn

  • MD5

    d57936bcb77083154b0d281737e75cb0

  • SHA1

    76d098c9868bae3185d7422aa31404b33d964fbe

  • SHA256

    40f4abd6538f6bb6bea75ce34dfd087614bc33bf33e1bc6fd31fe8a2bba4f960

  • SHA512

    77e76694dc968ccb4f7c84f68623478dfee1de72e1b33dbd09b2924ab619c50ea28b5e371c56a7991eb1f7163754d4699e0d2d9aeddcc154550bf56e9bced557

Score
10/10

Malware Config

Targets

    • Target

      40f4abd6538f6bb6bea75ce34dfd087614bc33bf33e1bc6fd31fe8a2bba4f960

    • Size

      396KB

    • MD5

      d57936bcb77083154b0d281737e75cb0

    • SHA1

      76d098c9868bae3185d7422aa31404b33d964fbe

    • SHA256

      40f4abd6538f6bb6bea75ce34dfd087614bc33bf33e1bc6fd31fe8a2bba4f960

    • SHA512

      77e76694dc968ccb4f7c84f68623478dfee1de72e1b33dbd09b2924ab619c50ea28b5e371c56a7991eb1f7163754d4699e0d2d9aeddcc154550bf56e9bced557

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks