General

  • Target

    a73eac15797130c381b5b4a65c3fb1cfc723b1586a1882c981211787bba285a6

  • Size

    6.8MB

  • Sample

    220128-r4yy6sfbf9

  • MD5

    9fcff92538e35cd213a576d82e318c74

  • SHA1

    7cfe1ab0593d8607887cc0aa64d6c429ad1764c5

  • SHA256

    a73eac15797130c381b5b4a65c3fb1cfc723b1586a1882c981211787bba285a6

  • SHA512

    a8cc6a6911267deb3f412fc1e2c7e24c099104012ee72fd713b44b92aec67e1d85b273bfb2ac2d44c12fbaf50bd00199815eecca0dfd8b32faad66829e98505f

Malware Config

Targets

    • Target

      a73eac15797130c381b5b4a65c3fb1cfc723b1586a1882c981211787bba285a6

    • Size

      6.8MB

    • MD5

      9fcff92538e35cd213a576d82e318c74

    • SHA1

      7cfe1ab0593d8607887cc0aa64d6c429ad1764c5

    • SHA256

      a73eac15797130c381b5b4a65c3fb1cfc723b1586a1882c981211787bba285a6

    • SHA512

      a8cc6a6911267deb3f412fc1e2c7e24c099104012ee72fd713b44b92aec67e1d85b273bfb2ac2d44c12fbaf50bd00199815eecca0dfd8b32faad66829e98505f

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Executes dropped EXE

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks