General

  • Target

    57f5e7542423b77332d937faa7cc616227641b82596d61505f54e327312260fd

  • Size

    561KB

  • Sample

    220724-vmfm2sbgh8

  • MD5

    3b5ddf6236f3d325240c40a19d06b176

  • SHA1

    bfbd87db679b47ae722a7583bf07ba77919b0f8f

  • SHA256

    57f5e7542423b77332d937faa7cc616227641b82596d61505f54e327312260fd

  • SHA512

    4f03c801ab44f85d5dcb25ac083692c296c662985e88f2fc7851e0399ca9a39d78ae7eb48e62fe4e9bdb2ffe71b1b0e52de20621a1bafb083b3a4cd303e6f8e3

Malware Config

Targets

    • Target

      57f5e7542423b77332d937faa7cc616227641b82596d61505f54e327312260fd

    • Size

      561KB

    • MD5

      3b5ddf6236f3d325240c40a19d06b176

    • SHA1

      bfbd87db679b47ae722a7583bf07ba77919b0f8f

    • SHA256

      57f5e7542423b77332d937faa7cc616227641b82596d61505f54e327312260fd

    • SHA512

      4f03c801ab44f85d5dcb25ac083692c296c662985e88f2fc7851e0399ca9a39d78ae7eb48e62fe4e9bdb2ffe71b1b0e52de20621a1bafb083b3a4cd303e6f8e3

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks