General

  • Target

    4d850bb0ebc7ebf2a6d0431b5e0f455b0e6e9c0507f0c0fcf392d786d4affc03

  • Size

    580KB

  • Sample

    220712-c86ggsacd6

  • MD5

    012e9426b4cbd911d4583df40eab3593

  • SHA1

    af0c41120b3ed28bc12973f4a8e8c7d276c01eaf

  • SHA256

    4d850bb0ebc7ebf2a6d0431b5e0f455b0e6e9c0507f0c0fcf392d786d4affc03

  • SHA512

    6eb7f402de96fee21932afc851f6d3e2bc399c5587a53408094b365354d5f249b01c146b28fceb176ae4cabe97ccd6c56e13afb203c4817d67cf9f923d0bf497

Score
10/10

Malware Config

Targets

    • Target

      4d850bb0ebc7ebf2a6d0431b5e0f455b0e6e9c0507f0c0fcf392d786d4affc03

    • Size

      580KB

    • MD5

      012e9426b4cbd911d4583df40eab3593

    • SHA1

      af0c41120b3ed28bc12973f4a8e8c7d276c01eaf

    • SHA256

      4d850bb0ebc7ebf2a6d0431b5e0f455b0e6e9c0507f0c0fcf392d786d4affc03

    • SHA512

      6eb7f402de96fee21932afc851f6d3e2bc399c5587a53408094b365354d5f249b01c146b28fceb176ae4cabe97ccd6c56e13afb203c4817d67cf9f923d0bf497

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks