General

  • Target

    62da1ea6f12737a24733de2657eeba7557fa25c41766befec5c830d5dafe09b6

  • Size

    6.2MB

  • Sample

    210513-mw7awf1gvs

  • MD5

    a92bdf7da1feb431b92c3bd0e5ef990a

  • SHA1

    957a25e2cf3c408246427ab565db52dc358cd4e7

  • SHA256

    62da1ea6f12737a24733de2657eeba7557fa25c41766befec5c830d5dafe09b6

  • SHA512

    cb85dc1914d0f7cab7f8d2a6868ffd55b5aeeeb0afe4b5d87481be696b277974e70feafe97c601a171718f6a0182b034c32f6c511869a94182923be3ee98d1d5

Malware Config

Targets

    • Target

      62da1ea6f12737a24733de2657eeba7557fa25c41766befec5c830d5dafe09b6

    • Size

      6.2MB

    • MD5

      a92bdf7da1feb431b92c3bd0e5ef990a

    • SHA1

      957a25e2cf3c408246427ab565db52dc358cd4e7

    • SHA256

      62da1ea6f12737a24733de2657eeba7557fa25c41766befec5c830d5dafe09b6

    • SHA512

      cb85dc1914d0f7cab7f8d2a6868ffd55b5aeeeb0afe4b5d87481be696b277974e70feafe97c601a171718f6a0182b034c32f6c511869a94182923be3ee98d1d5

    • Modifies WinLogon for persistence

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks