General

  • Target

    48d8f2502fe8a70ad31bba1388e9db78556419b62b615254a9cb813d5bbfcded

  • Size

    714KB

  • Sample

    220714-b39fhsbaf5

  • MD5

    d91988e5b8e7e3b044984188df15fd01

  • SHA1

    933e090ad781a7208ae78937162423d2b165bd0d

  • SHA256

    48d8f2502fe8a70ad31bba1388e9db78556419b62b615254a9cb813d5bbfcded

  • SHA512

    b10e8842b2a962a844f49e931fa12e7de34332885fcfb3fabfeb96eeb43aefbb8fa141adcda5acc6cd8db5329fdbc705ae63e6cd8b510210168e0dc301370ee2

Score
10/10

Malware Config

Targets

    • Target

      48d8f2502fe8a70ad31bba1388e9db78556419b62b615254a9cb813d5bbfcded

    • Size

      714KB

    • MD5

      d91988e5b8e7e3b044984188df15fd01

    • SHA1

      933e090ad781a7208ae78937162423d2b165bd0d

    • SHA256

      48d8f2502fe8a70ad31bba1388e9db78556419b62b615254a9cb813d5bbfcded

    • SHA512

      b10e8842b2a962a844f49e931fa12e7de34332885fcfb3fabfeb96eeb43aefbb8fa141adcda5acc6cd8db5329fdbc705ae63e6cd8b510210168e0dc301370ee2

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks