General

  • Target

    e66e0ee41b023384c74de2b9d302275094707ed4ad74e564b0932652ff9a7f2e

  • Size

    6.4MB

  • Sample

    210508-6z6skwhkf2

  • MD5

    41253bfee19b9631d3c508621fc9deb6

  • SHA1

    045398163ddb346eca0636bc7f9acc58f993c1e9

  • SHA256

    e66e0ee41b023384c74de2b9d302275094707ed4ad74e564b0932652ff9a7f2e

  • SHA512

    851dc55ffb8263f5bfcad9537fb81c5d4168d2d96bd29f085b785405216b348d99aabee102522dec587a9c70ff1486f67f052c167e0dd39e01be85329466d9c5

Malware Config

Targets

    • Target

      e66e0ee41b023384c74de2b9d302275094707ed4ad74e564b0932652ff9a7f2e

    • Size

      6.4MB

    • MD5

      41253bfee19b9631d3c508621fc9deb6

    • SHA1

      045398163ddb346eca0636bc7f9acc58f993c1e9

    • SHA256

      e66e0ee41b023384c74de2b9d302275094707ed4ad74e564b0932652ff9a7f2e

    • SHA512

      851dc55ffb8263f5bfcad9537fb81c5d4168d2d96bd29f085b785405216b348d99aabee102522dec587a9c70ff1486f67f052c167e0dd39e01be85329466d9c5

    • Modifies WinLogon for persistence

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks