General

  • Target

    R6S by Sylent.exe

  • Size

    18.6MB

  • Sample

    210717-pag88j6s46

  • MD5

    03a47183bc95af485b5ef94ae596d4dd

  • SHA1

    b5706ddfd7329a1f16aa376a7d52dc9b0d400b0f

  • SHA256

    d2b0b4271f30825e9bd525f8ddd2c0f4c44c3f3c9548cb05e8e4117cf49ee768

  • SHA512

    1e8f881da0daaca1a55370962450d13364e95bf6d8fd900b0965eee18026360ab3684a88fecdf0e634831566d89611654fc157281708c2aea83a9fed526576eb

Malware Config

Targets

    • Target

      R6S by Sylent.exe

    • Size

      18.6MB

    • MD5

      03a47183bc95af485b5ef94ae596d4dd

    • SHA1

      b5706ddfd7329a1f16aa376a7d52dc9b0d400b0f

    • SHA256

      d2b0b4271f30825e9bd525f8ddd2c0f4c44c3f3c9548cb05e8e4117cf49ee768

    • SHA512

      1e8f881da0daaca1a55370962450d13364e95bf6d8fd900b0965eee18026360ab3684a88fecdf0e634831566d89611654fc157281708c2aea83a9fed526576eb

    • Modifies security service

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Drops startup file

    • Loads dropped DLL

    • Windows security modification

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Tasks