General

  • Target

    d87864311e6996b8f6276047f0482197f90d41c13dead80533d9886e21d8cf97

  • Size

    1.7MB

  • Sample

    220731-jythhagehj

  • MD5

    cfd7c140e37c9a6ff608205f087b8325

  • SHA1

    d73c004d096f3a4ceb07c29e4bdcdce26ff61932

  • SHA256

    d87864311e6996b8f6276047f0482197f90d41c13dead80533d9886e21d8cf97

  • SHA512

    29bf3e11fd8e451429c4706e106c16ae0dbb31a847656f3c52eeaf2236e0cc2f8edd588bcab174377e7d5b2f0acab613caf9606c9eefa6e51b984922eb79b7b2

Score
10/10

Malware Config

Targets

    • Target

      d87864311e6996b8f6276047f0482197f90d41c13dead80533d9886e21d8cf97

    • Size

      1.7MB

    • MD5

      cfd7c140e37c9a6ff608205f087b8325

    • SHA1

      d73c004d096f3a4ceb07c29e4bdcdce26ff61932

    • SHA256

      d87864311e6996b8f6276047f0482197f90d41c13dead80533d9886e21d8cf97

    • SHA512

      29bf3e11fd8e451429c4706e106c16ae0dbb31a847656f3c52eeaf2236e0cc2f8edd588bcab174377e7d5b2f0acab613caf9606c9eefa6e51b984922eb79b7b2

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks