General

  • Target

    86323f88c25087297a92e91065b6f9d111f57954e82dbb7317f9f535af71fae8

  • Size

    426KB

  • Sample

    220731-ks623saadl

  • MD5

    78ce45061e4eb02f1ecba7f6027fceb2

  • SHA1

    007c03dac41efb63dba336aec8812e05b538c569

  • SHA256

    86323f88c25087297a92e91065b6f9d111f57954e82dbb7317f9f535af71fae8

  • SHA512

    1451957185e8cd9bbe0686139365aedaa04cb523791b0247f25b48d631c007ced32f0ed7f6e2ec5fea88b2320c18675675a98c1197ae0506614e171b68e08972

Malware Config

Targets

    • Target

      86323f88c25087297a92e91065b6f9d111f57954e82dbb7317f9f535af71fae8

    • Size

      426KB

    • MD5

      78ce45061e4eb02f1ecba7f6027fceb2

    • SHA1

      007c03dac41efb63dba336aec8812e05b538c569

    • SHA256

      86323f88c25087297a92e91065b6f9d111f57954e82dbb7317f9f535af71fae8

    • SHA512

      1451957185e8cd9bbe0686139365aedaa04cb523791b0247f25b48d631c007ced32f0ed7f6e2ec5fea88b2320c18675675a98c1197ae0506614e171b68e08972

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops desktop.ini file(s)

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks