General

  • Target

    56effa221e16c85780a61c9cdfa3eb035778263647daf4a6d22cac864fc4e83d

  • Size

    677KB

  • Sample

    220725-bl5q1ageg3

  • MD5

    a424ac35a02c4ac8e5632ecd3cde19ea

  • SHA1

    607e38eacc8b6594292dbb21adf5ea01c8d7f2c5

  • SHA256

    56effa221e16c85780a61c9cdfa3eb035778263647daf4a6d22cac864fc4e83d

  • SHA512

    ca1f5097624eb26d84a33b128fd387a9ce620f0b736002c4ae7ee6da981f110eed687dc5f191f0be2647f82c079b74728a7891b4f3f7eaa69fecd70eab54c79c

Score
10/10

Malware Config

Targets

    • Target

      56effa221e16c85780a61c9cdfa3eb035778263647daf4a6d22cac864fc4e83d

    • Size

      677KB

    • MD5

      a424ac35a02c4ac8e5632ecd3cde19ea

    • SHA1

      607e38eacc8b6594292dbb21adf5ea01c8d7f2c5

    • SHA256

      56effa221e16c85780a61c9cdfa3eb035778263647daf4a6d22cac864fc4e83d

    • SHA512

      ca1f5097624eb26d84a33b128fd387a9ce620f0b736002c4ae7ee6da981f110eed687dc5f191f0be2647f82c079b74728a7891b4f3f7eaa69fecd70eab54c79c

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks