General

  • Target

    047fcf6cf1e83002c31d9725f92abe3014bcb0a65a3078dcc6467036ba792547.exe

  • Size

    852KB

  • Sample

    240320-cf7h3sea65

  • MD5

    e04213f27f4e2c763e0b8910f7743af3

  • SHA1

    2707a70bfb085112cb02c82c738f752a4e789825

  • SHA256

    047fcf6cf1e83002c31d9725f92abe3014bcb0a65a3078dcc6467036ba792547

  • SHA512

    423039cd63fac7e3ceda72bf26695cc94339b1105b4c1a0bf603364e239658b30be841c47e781da867ff1ea0f22428c589ce3daac2c3834ef58e552fdafb242e

  • SSDEEP

    24576:2deM8k31Q2B7oVSRZw/bO/PVggnoGhkOF8rcbfdaMQ8NNr+OZQw6F77GEm+pV0kn:8e831bEOOyy

Malware Config

Targets

    • Target

      047fcf6cf1e83002c31d9725f92abe3014bcb0a65a3078dcc6467036ba792547.exe

    • Size

      852KB

    • MD5

      e04213f27f4e2c763e0b8910f7743af3

    • SHA1

      2707a70bfb085112cb02c82c738f752a4e789825

    • SHA256

      047fcf6cf1e83002c31d9725f92abe3014bcb0a65a3078dcc6467036ba792547

    • SHA512

      423039cd63fac7e3ceda72bf26695cc94339b1105b4c1a0bf603364e239658b30be841c47e781da867ff1ea0f22428c589ce3daac2c3834ef58e552fdafb242e

    • SSDEEP

      24576:2deM8k31Q2B7oVSRZw/bO/PVggnoGhkOF8rcbfdaMQ8NNr+OZQw6F77GEm+pV0kn:8e831bEOOyy

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Detects PowerShell content designed to retrieve passwords from host

    • detects Windows exceutables potentially bypassing UAC using eventvwr.exe

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks