General

  • Target

    49f66c987a29c39d1af5f08a641c9e9e6f356762a2de5da978105b1c2afeacd1

  • Size

    1.5MB

  • Sample

    220712-sfwpkshhe9

  • MD5

    78ea97904eb1ae6e58cfe05b4a2c541f

  • SHA1

    bcd8368e79b3b17cad88e21e71177f6f685ca0b3

  • SHA256

    49f66c987a29c39d1af5f08a641c9e9e6f356762a2de5da978105b1c2afeacd1

  • SHA512

    88938f32bfdb6380d14697d6bf694478f77ed935c0635ad38a68c6e6e8f9a67869b04db85039098978907e7b1cee1b18af1ec87b6454e34d767075eb3ff1cc32

Malware Config

Targets

    • Target

      49f66c987a29c39d1af5f08a641c9e9e6f356762a2de5da978105b1c2afeacd1

    • Size

      1.5MB

    • MD5

      78ea97904eb1ae6e58cfe05b4a2c541f

    • SHA1

      bcd8368e79b3b17cad88e21e71177f6f685ca0b3

    • SHA256

      49f66c987a29c39d1af5f08a641c9e9e6f356762a2de5da978105b1c2afeacd1

    • SHA512

      88938f32bfdb6380d14697d6bf694478f77ed935c0635ad38a68c6e6e8f9a67869b04db85039098978907e7b1cee1b18af1ec87b6454e34d767075eb3ff1cc32

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks