General

  • Target

    64c9b9ded4fb595717bf9a0999f6cc2f92e7b7d4b7d06eaaa8e75ba6922e7335

  • Size

    4.2MB

  • Sample

    220128-wak8fahgg5

  • MD5

    a09a299fe4a28990a8e2aa829d5c8813

  • SHA1

    e95c651c539eaf73e142d1867a1a96098a5e219f

  • SHA256

    64c9b9ded4fb595717bf9a0999f6cc2f92e7b7d4b7d06eaaa8e75ba6922e7335

  • SHA512

    9adbda1c42ed28890acad6430938e05cdbcb75ac1d01438b047ea6ee3a322ec16106dc049cbc463ccc27d4882a39949745390a34b3a8a21a97ee52a3a5528f57

Score
10/10

Malware Config

Targets

    • Target

      64c9b9ded4fb595717bf9a0999f6cc2f92e7b7d4b7d06eaaa8e75ba6922e7335

    • Size

      4.2MB

    • MD5

      a09a299fe4a28990a8e2aa829d5c8813

    • SHA1

      e95c651c539eaf73e142d1867a1a96098a5e219f

    • SHA256

      64c9b9ded4fb595717bf9a0999f6cc2f92e7b7d4b7d06eaaa8e75ba6922e7335

    • SHA512

      9adbda1c42ed28890acad6430938e05cdbcb75ac1d01438b047ea6ee3a322ec16106dc049cbc463ccc27d4882a39949745390a34b3a8a21a97ee52a3a5528f57

    Score
    10/10
    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks