General

  • Target

    4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965

  • Size

    970KB

  • Sample

    220712-p88m3abcbn

  • MD5

    111e4fbb5d39220f7f9a879540f9a503

  • SHA1

    f06513e76722671d662f33d6fb7440593fa1ea6e

  • SHA256

    4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965

  • SHA512

    0c27d262da850d431bc2456cfe04342b1f05a422b1e1651c6725c183a291f8b06bb5be9842965f995d52f2a8bb2d246ff32d67ad192af6593713a4ad5fee3c81

Score
10/10

Malware Config

Targets

    • Target

      4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965

    • Size

      970KB

    • MD5

      111e4fbb5d39220f7f9a879540f9a503

    • SHA1

      f06513e76722671d662f33d6fb7440593fa1ea6e

    • SHA256

      4a83406a5ace4cd0c6ee8f4adaf0bf3a4c613644f0992057a5440bec85d80965

    • SHA512

      0c27d262da850d431bc2456cfe04342b1f05a422b1e1651c6725c183a291f8b06bb5be9842965f995d52f2a8bb2d246ff32d67ad192af6593713a4ad5fee3c81

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks