General

  • Target

    572d563802be3caa21cedde059936b4b9039da000bc6858de3397bd8714bce87

  • Size

    689KB

  • Sample

    220725-asbwtsfbc4

  • MD5

    01cb3539e8bdc68b366a4f60d4149e61

  • SHA1

    c9aa3ed2809511a269daaa96ddc3f218d3542148

  • SHA256

    572d563802be3caa21cedde059936b4b9039da000bc6858de3397bd8714bce87

  • SHA512

    ce4b6ad6c5ca034e990b4dd474766cefca1a79275a5359b83d065a718e62592945a3dc9c6a24c597f1f4742787a93ee18a02feb3039622e428516dc624f20594

Score
10/10

Malware Config

Targets

    • Target

      572d563802be3caa21cedde059936b4b9039da000bc6858de3397bd8714bce87

    • Size

      689KB

    • MD5

      01cb3539e8bdc68b366a4f60d4149e61

    • SHA1

      c9aa3ed2809511a269daaa96ddc3f218d3542148

    • SHA256

      572d563802be3caa21cedde059936b4b9039da000bc6858de3397bd8714bce87

    • SHA512

      ce4b6ad6c5ca034e990b4dd474766cefca1a79275a5359b83d065a718e62592945a3dc9c6a24c597f1f4742787a93ee18a02feb3039622e428516dc624f20594

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks