General

  • Target

    agent6.10.exe

  • Size

    11.0MB

  • Sample

    210615-1gkar6cm4s

  • MD5

    9701303ea427b0cb440dfc9a6f48b827

  • SHA1

    3aa8a4554b175db9da5eeb7824b5c047638a6a9d

  • SHA256

    a7f7cc2bdbe5ac6d55841bcfb0ada2c0e55192af5f70dcdda68e7fd17112346a

  • SHA512

    e2284886bac6997adbbcf0ba4ac3eb6429928f77ece6de68e0207c8a9c81f833a16730cc0079ec0f74d4e6f53aebd2a3627770347354b15c50c903edc9a0bee5

Malware Config

Targets

    • Target

      agent6.10.exe

    • Size

      11.0MB

    • MD5

      9701303ea427b0cb440dfc9a6f48b827

    • SHA1

      3aa8a4554b175db9da5eeb7824b5c047638a6a9d

    • SHA256

      a7f7cc2bdbe5ac6d55841bcfb0ada2c0e55192af5f70dcdda68e7fd17112346a

    • SHA512

      e2284886bac6997adbbcf0ba4ac3eb6429928f77ece6de68e0207c8a9c81f833a16730cc0079ec0f74d4e6f53aebd2a3627770347354b15c50c903edc9a0bee5

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks