General

  • Target

    57eeaa53f9f5977a89d50c7435f6f81caf1de0312c8f1e592957f3812a09e824

  • Size

    577KB

  • Sample

    220724-vt7p4scbf8

  • MD5

    e1767864fd8a7dc7dd70166edab187d2

  • SHA1

    8f2e2d6c1e6a754f11027019e36595c300cd6414

  • SHA256

    57eeaa53f9f5977a89d50c7435f6f81caf1de0312c8f1e592957f3812a09e824

  • SHA512

    0ec330a671619690028f655bfb58ec4cddd78927676bde81a456cbb0de465c866dddc1164f89edb81be8c87ffb5d72f434989d00cacc9a0a1206c9eecbfec822

Malware Config

Targets

    • Target

      57eeaa53f9f5977a89d50c7435f6f81caf1de0312c8f1e592957f3812a09e824

    • Size

      577KB

    • MD5

      e1767864fd8a7dc7dd70166edab187d2

    • SHA1

      8f2e2d6c1e6a754f11027019e36595c300cd6414

    • SHA256

      57eeaa53f9f5977a89d50c7435f6f81caf1de0312c8f1e592957f3812a09e824

    • SHA512

      0ec330a671619690028f655bfb58ec4cddd78927676bde81a456cbb0de465c866dddc1164f89edb81be8c87ffb5d72f434989d00cacc9a0a1206c9eecbfec822

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks