General

  • Target

    5eabb12899678a2d249d0558d3c4cd66b96f5efaab0140de2054fa56065b22a4

  • Size

    1.6MB

  • Sample

    220731-yam35sedgn

  • MD5

    d48444c53ad94d3a3b8a335824e7f604

  • SHA1

    3bbfc9e313c8bb67b079a9a3b06f08f7dca29e48

  • SHA256

    5eabb12899678a2d249d0558d3c4cd66b96f5efaab0140de2054fa56065b22a4

  • SHA512

    6afe09beee00048aed426abf29967603cb897a8e5f1f3be302910786763230c945d98faa93a44c7ffdf1311be8bd5bdc54984d8861fd913eb1f9d806c407a804

Score
10/10

Malware Config

Targets

    • Target

      5eabb12899678a2d249d0558d3c4cd66b96f5efaab0140de2054fa56065b22a4

    • Size

      1.6MB

    • MD5

      d48444c53ad94d3a3b8a335824e7f604

    • SHA1

      3bbfc9e313c8bb67b079a9a3b06f08f7dca29e48

    • SHA256

      5eabb12899678a2d249d0558d3c4cd66b96f5efaab0140de2054fa56065b22a4

    • SHA512

      6afe09beee00048aed426abf29967603cb897a8e5f1f3be302910786763230c945d98faa93a44c7ffdf1311be8bd5bdc54984d8861fd913eb1f9d806c407a804

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks