General

  • Target

    571d1286aa8bfe4bcc65da6d1fba71a7c48261b14142233f187dd2ff628544f2

  • Size

    535KB

  • Sample

    220725-a2drsafhbj

  • MD5

    5c47ef53e1269db13123dc2e2d0d997d

  • SHA1

    1abd812966b34e8392fd40e0e3fe2e8a4997df13

  • SHA256

    571d1286aa8bfe4bcc65da6d1fba71a7c48261b14142233f187dd2ff628544f2

  • SHA512

    b6aab032422dc225cd45d6e5f509b39496d1e6c8766eee1eb72081d7077294702c4a4f33c07687c403db5ea63ee525d4e4e8bab1b94f6b84fa17018fa0c0aa2d

Score
10/10

Malware Config

Targets

    • Target

      571d1286aa8bfe4bcc65da6d1fba71a7c48261b14142233f187dd2ff628544f2

    • Size

      535KB

    • MD5

      5c47ef53e1269db13123dc2e2d0d997d

    • SHA1

      1abd812966b34e8392fd40e0e3fe2e8a4997df13

    • SHA256

      571d1286aa8bfe4bcc65da6d1fba71a7c48261b14142233f187dd2ff628544f2

    • SHA512

      b6aab032422dc225cd45d6e5f509b39496d1e6c8766eee1eb72081d7077294702c4a4f33c07687c403db5ea63ee525d4e4e8bab1b94f6b84fa17018fa0c0aa2d

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks