General

  • Target

    59abd2775bc9feb45089650be883b2f1faa98500c785668213895216dc6cfc32

  • Size

    881KB

  • Sample

    240527-2e7vwsde42

  • MD5

    3bb2899abfced1162e02f284920de161

  • SHA1

    f11a8f882de65265993134d0207f28041d83769e

  • SHA256

    59abd2775bc9feb45089650be883b2f1faa98500c785668213895216dc6cfc32

  • SHA512

    3a966266057ecc453bd7a92c5fcefaff5ad2368404f5fbcc0b8070e1856254199f3ddc6d995a2d45f5c5c7075b51228428686f074e6a1f94b1e133a6bbec941a

  • SSDEEP

    12288:0NlZD4U9LBMYROgRk6ofYAF3nyN0+U4H444l+:SiUYgu6ofnn60+U4H444l+

Malware Config

Targets

    • Target

      59abd2775bc9feb45089650be883b2f1faa98500c785668213895216dc6cfc32

    • Size

      881KB

    • MD5

      3bb2899abfced1162e02f284920de161

    • SHA1

      f11a8f882de65265993134d0207f28041d83769e

    • SHA256

      59abd2775bc9feb45089650be883b2f1faa98500c785668213895216dc6cfc32

    • SHA512

      3a966266057ecc453bd7a92c5fcefaff5ad2368404f5fbcc0b8070e1856254199f3ddc6d995a2d45f5c5c7075b51228428686f074e6a1f94b1e133a6bbec941a

    • SSDEEP

      12288:0NlZD4U9LBMYROgRk6ofYAF3nyN0+U4H444l+:SiUYgu6ofnn60+U4H444l+

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Detects executables packed with SmartAssembly

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks