General

  • Target

    agent.bin.zip

  • Size

    10.4MB

  • Sample

    201211-jv31s6lfas

  • MD5

    eee08cc25601be900d0aa9ccefb2a09b

  • SHA1

    595b0da77617cc7986123783fe30d0179031be60

  • SHA256

    7ce7f0f0786b3da3e605dbbbc9bc3ff7cc0099beedfcf4d4556576489abf86dc

  • SHA512

    3553761d9f3c8423dbb9f912846aaa478e31dae0164b2bc3d7d62a0004f29197bae6deadbf0db1a7243cd98bef69df48d4146c0b19906350149c7feac2110555

Score
10/10

Malware Config

Targets

    • Target

      agent.bin

    • Size

      10.9MB

    • MD5

      921f0eb14ea4bb8ec85c307da29a66cd

    • SHA1

      35b61e6d895627a10015dcd4c0d03c4423a02d0d

    • SHA256

      3d0862aa6676aa428e26e0b1c813c090c410b759fa7e9cdf8b0eb9d313d3618c

    • SHA512

      9125f936b12fc3c30be7a33a4d61bde1267f89bd8adee977664759bb410987c0055131187603e5007faaf80ffdd7cd79b46878471eb71fb73a13db81657660d7

    Score
    10/10
    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • JavaScript code in executable

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks