General

  • Target

    6157d324fcdc9b087aa9a488cad9ee7b62da9aa4ea87918eaf9833bdcaacdf94

  • Size

    889KB

  • Sample

    220730-1byx5shhcj

  • MD5

    661cdd9c6939aa0894947e268e749f9e

  • SHA1

    666915924a970492f308a29811001b04937ccee2

  • SHA256

    6157d324fcdc9b087aa9a488cad9ee7b62da9aa4ea87918eaf9833bdcaacdf94

  • SHA512

    de2935faa989c17a8f640d1b5eb008aceed49f4f9583c0c15299a11a37674c6e0faf88c405d57e17b2a7f25c1b538a92e4d841b0b7c6face6e5acdc66ed37a73

Score
10/10

Malware Config

Targets

    • Target

      6157d324fcdc9b087aa9a488cad9ee7b62da9aa4ea87918eaf9833bdcaacdf94

    • Size

      889KB

    • MD5

      661cdd9c6939aa0894947e268e749f9e

    • SHA1

      666915924a970492f308a29811001b04937ccee2

    • SHA256

      6157d324fcdc9b087aa9a488cad9ee7b62da9aa4ea87918eaf9833bdcaacdf94

    • SHA512

      de2935faa989c17a8f640d1b5eb008aceed49f4f9583c0c15299a11a37674c6e0faf88c405d57e17b2a7f25c1b538a92e4d841b0b7c6face6e5acdc66ed37a73

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks