General

  • Target

    4709B7715F29A8E67F4DE4114391FD440A7038BC2AEAC.exe

  • Size

    10.6MB

  • Sample

    211122-z5lz1aghbk

  • MD5

    3c812375bd2333ff940800eb818c00b4

  • SHA1

    6dfba72690d9da80ea1d583ab6d8deeed2aef1ce

  • SHA256

    4709b7715f29a8e67f4de4114391fd440a7038bc2aeac2f15741d7eecf1a749c

  • SHA512

    e4d50d908725b891e5945cc43e73eb3223066ffe111e8efbf05e3786f2044085d93ce13b94af6f92cb6200e7771c8ab1b81dd526ec89d0e250f95e024db5ea1d

Malware Config

Targets

    • Target

      4709B7715F29A8E67F4DE4114391FD440A7038BC2AEAC.exe

    • Size

      10.6MB

    • MD5

      3c812375bd2333ff940800eb818c00b4

    • SHA1

      6dfba72690d9da80ea1d583ab6d8deeed2aef1ce

    • SHA256

      4709b7715f29a8e67f4de4114391fd440a7038bc2aeac2f15741d7eecf1a749c

    • SHA512

      e4d50d908725b891e5945cc43e73eb3223066ffe111e8efbf05e3786f2044085d93ce13b94af6f92cb6200e7771c8ab1b81dd526ec89d0e250f95e024db5ea1d

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks