General

  • Target

    5c468468f39a524ad516c211814fc85e9e123321a9d60f9ebf0a76549ee7d2ee

  • Size

    453KB

  • Sample

    220801-shqaksacd9

  • MD5

    a4ba7974d0f48fedd8e7f4c7553752b6

  • SHA1

    7f315902080074bc177fd3fb103c6506811b56ec

  • SHA256

    5c468468f39a524ad516c211814fc85e9e123321a9d60f9ebf0a76549ee7d2ee

  • SHA512

    b75b400ac40fd1c88dc69e9dc27fe2ad47344f710082e91ce93976b3788765ad13de26151250e8cd763ee08797ad3391e6965c8eff6f5a964c7d4e275814bc21

Score
10/10

Malware Config

Targets

    • Target

      5c468468f39a524ad516c211814fc85e9e123321a9d60f9ebf0a76549ee7d2ee

    • Size

      453KB

    • MD5

      a4ba7974d0f48fedd8e7f4c7553752b6

    • SHA1

      7f315902080074bc177fd3fb103c6506811b56ec

    • SHA256

      5c468468f39a524ad516c211814fc85e9e123321a9d60f9ebf0a76549ee7d2ee

    • SHA512

      b75b400ac40fd1c88dc69e9dc27fe2ad47344f710082e91ce93976b3788765ad13de26151250e8cd763ee08797ad3391e6965c8eff6f5a964c7d4e275814bc21

    Score
    10/10
    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks