General

  • Target

    661c88e07591a8919e5004cc936ea3ff.exe

  • Size

    10.9MB

  • Sample

    210511-rmd1l5y1vj

  • MD5

    661c88e07591a8919e5004cc936ea3ff

  • SHA1

    5bea1ae34cbee1c09d10c7f4f7001daeb18d607c

  • SHA256

    38602e2e2f729e174440339fd1551e133ae03d93e16bbcef8f0b9c8aa1da9b1c

  • SHA512

    b79075e3e51d4a2151cebc89cc97bc5efaacd820ba36d8e664ab982e2e5ee3dd2022249cb65963dfb493f20a403786318b6026ad3d8157e15f73df48a4e337c2

Score
10/10

Malware Config

Targets

    • Target

      661c88e07591a8919e5004cc936ea3ff.exe

    • Size

      10.9MB

    • MD5

      661c88e07591a8919e5004cc936ea3ff

    • SHA1

      5bea1ae34cbee1c09d10c7f4f7001daeb18d607c

    • SHA256

      38602e2e2f729e174440339fd1551e133ae03d93e16bbcef8f0b9c8aa1da9b1c

    • SHA512

      b79075e3e51d4a2151cebc89cc97bc5efaacd820ba36d8e664ab982e2e5ee3dd2022249cb65963dfb493f20a403786318b6026ad3d8157e15f73df48a4e337c2

    Score
    10/10
    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks