General

  • Target

    d2cd31cc8ca46fabcd8d5922c613e0817965d4a949eff1c158e8705217e6be54

  • Size

    1.4MB

  • Sample

    220725-f15rrsgca9

  • MD5

    ef0b9845f10cf8fc874b8562b9503f18

  • SHA1

    38cb9ea397cf2a33f4961be4e09273f159d6d07f

  • SHA256

    d2cd31cc8ca46fabcd8d5922c613e0817965d4a949eff1c158e8705217e6be54

  • SHA512

    e51c9bc7511c35e0e2008ba865a87336a9747928d87df7f91240d27975bdb0d5404cd5cef7f3b34ff29d2a2022db27cd61eb6f611cd9c4deaf0de5ce6073e51f

Malware Config

Targets

    • Target

      d2cd31cc8ca46fabcd8d5922c613e0817965d4a949eff1c158e8705217e6be54

    • Size

      1.4MB

    • MD5

      ef0b9845f10cf8fc874b8562b9503f18

    • SHA1

      38cb9ea397cf2a33f4961be4e09273f159d6d07f

    • SHA256

      d2cd31cc8ca46fabcd8d5922c613e0817965d4a949eff1c158e8705217e6be54

    • SHA512

      e51c9bc7511c35e0e2008ba865a87336a9747928d87df7f91240d27975bdb0d5404cd5cef7f3b34ff29d2a2022db27cd61eb6f611cd9c4deaf0de5ce6073e51f

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks