General

  • Target

    54f94da6735e929ed9df310b635ee9353be559dbe9da6e4507ba8640794f8f5a

  • Size

    394KB

  • Sample

    220725-v1chjscdcn

  • MD5

    acf4810fac7e2973532fe7c2828644a5

  • SHA1

    b20d237c3a0746bebdfdb54537a085b6be0a96c9

  • SHA256

    54f94da6735e929ed9df310b635ee9353be559dbe9da6e4507ba8640794f8f5a

  • SHA512

    281432f69c915fb83bbc9277d6fd05418932abd9c0a9c475848d51719aa2acf1b5904e126a7c7049c8f9451fd4589ff8349a22789d6fbfaf52c23de0af1059f9

Score
10/10

Malware Config

Targets

    • Target

      54f94da6735e929ed9df310b635ee9353be559dbe9da6e4507ba8640794f8f5a

    • Size

      394KB

    • MD5

      acf4810fac7e2973532fe7c2828644a5

    • SHA1

      b20d237c3a0746bebdfdb54537a085b6be0a96c9

    • SHA256

      54f94da6735e929ed9df310b635ee9353be559dbe9da6e4507ba8640794f8f5a

    • SHA512

      281432f69c915fb83bbc9277d6fd05418932abd9c0a9c475848d51719aa2acf1b5904e126a7c7049c8f9451fd4589ff8349a22789d6fbfaf52c23de0af1059f9

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks