General

  • Target

    AB83D0AA6A9DB035E8AD1D885FFAEC95BE2C54EDE29AA.exe

  • Size

    14.9MB

  • Sample

    210416-xqe3h2a692

  • MD5

    9dee1357e73bf18ca611e1b0d758435b

  • SHA1

    aeddcc6022b2f1efdb2b65a558ca930c4b7cbb65

  • SHA256

    ab83d0aa6a9db035e8ad1d885ffaec95be2c54ede29aaea31bd35e7b9459eaa9

  • SHA512

    91feb26965514c1e5ad473460bf807ec1459e6e9f02b07f7720a81fdaf3ba0c67592beb25e86fa158a4df67f388d27733c9a7d32e5027a104559bf82753d30aa

Score
10/10

Malware Config

Targets

    • Target

      AB83D0AA6A9DB035E8AD1D885FFAEC95BE2C54EDE29AA.exe

    • Size

      14.9MB

    • MD5

      9dee1357e73bf18ca611e1b0d758435b

    • SHA1

      aeddcc6022b2f1efdb2b65a558ca930c4b7cbb65

    • SHA256

      ab83d0aa6a9db035e8ad1d885ffaec95be2c54ede29aaea31bd35e7b9459eaa9

    • SHA512

      91feb26965514c1e5ad473460bf807ec1459e6e9f02b07f7720a81fdaf3ba0c67592beb25e86fa158a4df67f388d27733c9a7d32e5027a104559bf82753d30aa

    Score
    10/10
    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks