General

  • Target

    dpwwkbvgzxukmji.exe

  • Size

    1.2MB

  • Sample

    241016-rp4wwatflf

  • MD5

    bdea975f05590979c4193de0b984da84

  • SHA1

    b37c50bda301d647282ef6cf5bd7d411e295cae9

  • SHA256

    26dcefb48f3b7fa97765b0f4db3ebfbf615f57b42c7c051c145e8981c4dbbdb3

  • SHA512

    59e19339b4681d45a644c7eeae00329e5cd9a56c6ecc17331bc43dcbaa020bf39cad5d241c365bbda0aa0f3ccaf0cd17ad1cccce381014169882a592570e666a

  • SSDEEP

    24576:Gtb20pkaCqT5TBWgNQ7aMN7IcAo6iRzpaOF/mN16AK:zVg5tQ7aMN7IryzpaOpmr5K

Malware Config

Targets

    • Target

      dpwwkbvgzxukmji.exe

    • Size

      1.2MB

    • MD5

      bdea975f05590979c4193de0b984da84

    • SHA1

      b37c50bda301d647282ef6cf5bd7d411e295cae9

    • SHA256

      26dcefb48f3b7fa97765b0f4db3ebfbf615f57b42c7c051c145e8981c4dbbdb3

    • SHA512

      59e19339b4681d45a644c7eeae00329e5cd9a56c6ecc17331bc43dcbaa020bf39cad5d241c365bbda0aa0f3ccaf0cd17ad1cccce381014169882a592570e666a

    • SSDEEP

      24576:Gtb20pkaCqT5TBWgNQ7aMN7IcAo6iRzpaOF/mN16AK:zVg5tQ7aMN7IryzpaOpmr5K

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Drops startup file

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.