General

  • Target

    1eab6168fc3f9556fbdd1147dcbf5c71b5f0dd819e3b779dee0c539c7ae21330

  • Size

    1.5MB

  • Sample

    221119-cj3z3ahd77

  • MD5

    1e08dabb86cdeca39354c5c91fdb0a60

  • SHA1

    d600d53c1d2618783c53037e191541d39f9b3138

  • SHA256

    1eab6168fc3f9556fbdd1147dcbf5c71b5f0dd819e3b779dee0c539c7ae21330

  • SHA512

    20ccaeb92f2d60f97cd0e4f0a0fff4039495949ecd9532ea20ea0d337de4dc966f8ac0f5259f60886c48a4458fe477ece8607852d77f9171ec6f6b2a31477793

  • SSDEEP

    24576:ttb20pksCqT5TBWgNQ7arGvjuoMg/Z3LxKOJL92Cv7C7sr7Ly6K6A:ePg5tQ7arGbLMg/Z3LEOx92k7vr72Z5

Malware Config

Targets

    • Target

      1eab6168fc3f9556fbdd1147dcbf5c71b5f0dd819e3b779dee0c539c7ae21330

    • Size

      1.5MB

    • MD5

      1e08dabb86cdeca39354c5c91fdb0a60

    • SHA1

      d600d53c1d2618783c53037e191541d39f9b3138

    • SHA256

      1eab6168fc3f9556fbdd1147dcbf5c71b5f0dd819e3b779dee0c539c7ae21330

    • SHA512

      20ccaeb92f2d60f97cd0e4f0a0fff4039495949ecd9532ea20ea0d337de4dc966f8ac0f5259f60886c48a4458fe477ece8607852d77f9171ec6f6b2a31477793

    • SSDEEP

      24576:ttb20pksCqT5TBWgNQ7arGvjuoMg/Z3LxKOJL92Cv7C7sr7Ly6K6A:ePg5tQ7arGbLMg/Z3LEOx92k7vr72Z5

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks